SlideShare a Scribd company logo
AI for Cyber Security and Adversarial AI
Domenico Raguseo
June 2019
@domenicoraguseo
IBM Security / © 2019 IBM Corporation
2 © 2018 IBM Corporation
Grow
Business
Stop
Threats
Prove
Compliance
Get
Ahead of
Compliance
Enhance
Security
Hygiene
Detect & Stop
Advanced
Threats
Orchestrate
Incident
Response
Master
Threat
Hunting
Secure
Hybrid
Cloud
Protect
Critical
Assets
Prevent
Advanced
Fraud
Govern
Users and
Identities
Let’s focus on the most critical security use cases
Outcome
Outcome
Outcome
Outcome-
-
-
-driven
driven
driven
driven
security
security
security
security
2 © 2018 IBM Corporation
3
Reactive strategies
driven by threats
Products and processes deployed
in silos
Organizations and teams
continue to work alone
Complexity continues to be today’s top concern
4 © 2018 IBM Corporation
SECURITY
SECURITY
SECURITY
SECURITY
ORCHESTRATION
ORCHESTRATION
ORCHESTRATION
ORCHESTRATION
& ANALYTICS
& ANALYTICS
& ANALYTICS
& ANALYTICS
THREAT
THREAT
THREAT
THREAT
INTEL
INTEL
INTEL
INTEL
ENDPOINT
ENDPOINT
ENDPOINT
ENDPOINT NETWORK
NETWORK
NETWORK
NETWORK
MOBILE
MOBILE
MOBILE
MOBILE
ADVANCED
ADVANCED
ADVANCED
ADVANCED
FRAUD
FRAUD
FRAUD
FRAUD
DATA
DATA
DATA
DATA
APPS
APPS
APPS
APPS
IDENTITY
IDENTITY
IDENTITY
IDENTITY
& ACCESS
& ACCESS
& ACCESS
& ACCESS
Build an integrated security immune system
Criminal detection
Fraud protection
Data access control
Application security management
Application scanning
Data protection
Device management
Transaction protection
Content security
Malware protection
Endpoint detection and
response
Endpoint patching and management Network forensics and threat management
Firewalls and intrusion prevention
Network visibility and segmentation
Access management
Identity governance and administration
Privileged user management
IDaaS
Mainframe security
Threat sharing
Vulnerability management
Security analytics
Threat and anomaly detection
Incident response
User behavior analytics
Threat hunting and investigation
IoCs
|
|
Analysis of an Incident
Activities performed during Business Email
Compromise – Case A
SECURITY
SECURITY
SECURITY
SECURITY
ORCHESTRATION
ORCHESTRATION
ORCHESTRATION
ORCHESTRATION
& ANALYTICS
& ANALYTICS
& ANALYTICS
& ANALYTICS
THREAT
THREAT
THREAT
THREAT
INTEL
INTEL
INTEL
INTEL
ENDPOIN
ENDPOIN
ENDPOIN
ENDPOINT
T
T
T NETWORK
NETWORK
NETWORK
NETWORK
MOBILE
MOBILE
MOBILE
MOBILE
ADVANCED
ADVANCED
ADVANCED
ADVANCED
FRAUD
FRAUD
FRAUD
FRAUD
DATA
DATA
DATA
DATA
APPS
APPS
APPS
APPS
IDENTITY
IDENTITY
IDENTITY
IDENTITY
& ACCESS
& ACCESS
& ACCESS
& ACCESS
Data access control
Application security management
Application scanning
Data protection
Device management
Transaction protection
Content security
Malware protection
Endpoint detection and
response
Endpoint patching and management
Access management
IDaaS
Mainframe security
Threat sharing IoCs
|
|
Email is received
with malicious
attachment and
“payload” macro
is executed
(malware
defenses fail)
Unpatched
vulnerabilit
y is
exploited
Command and
control is
allowed to be
established
Credentia
l are
stooled
Kill Chain – Case A
Email is received
with malicious
attachment and
“payload” macro is
executed (malware
defenses fail)
File is
Downloade
d from a
web site
SECURITY
SECURITY
SECURITY
SECURITY
ORCHESTRATION
ORCHESTRATION
ORCHESTRATION
ORCHESTRATION
& ANALYTICS
& ANALYTICS
& ANALYTICS
& ANALYTICS
THREAT
THREAT
THREAT
THREAT
INTEL
INTEL
INTEL
INTEL
ENDPOIN
ENDPOIN
ENDPOIN
ENDPOINT
T
T
T NETWORK
NETWORK
NETWORK
NETWORK
MOBILE
MOBILE
MOBILE
MOBILE
ADVANCED
ADVANCED
ADVANCED
ADVANCED
FRAUD
FRAUD
FRAUD
FRAUD
DATA
DATA
DATA
DATA
APPS
APPS
APPS
APPS
IDENTITY
IDENTITY
IDENTITY
IDENTITY
& ACCESS
& ACCESS
& ACCESS
& ACCESS
Data access control
Application security management
Application scanning
Data protection
Device management
Transaction protection
Content security
Malware protection
Endpoint detection and
response
Endpoint patching and management
Access management
IDaaS
Mainframe security
Threat sharing IoCs
|
|
Email is received
with malicious
attachment and
“payload” macro is
executed (malware
defenses fail)
Unpatched
vulnerabilit
y is
exploited
Identity
and
Access
Command and
control is
allowed to be
established
Watering hole .. A change in attach strategy . Case B
Kill Chain - Case B
Case B =! Case A
Kill Chain – Case A
Case B =! Case A
Attach Pattern
A + B
8 © 2018 IBM Corporation
The future of Incident Analysis in Cyber Security is AI
Use AI to gain a head start
Automatically investigate incidents and
anomalies to identify the most likely threats
– Quickly gather insights from millions of external sources
– Apply cognitive reasoning to build relationships
9 | Welcome to the cognitive era.
9
Incident Analysis
#2 most challenging area
today is optimizing
accuracy alerts (too
many false positives)
#3 most challenging area
due to insufficient
resources is threat
identification, monitoring
and escalating potential
incidents (61% selecting)
Speed gap
The top cybersecurity
challenge today and
tomorrow is reducing
average incident
response and
resolution time
This is despite the fact
that 80% said their
incident response speed
is much faster than two
years ago
Accuracy gap
Intelligence gap
#1 most challenging area
due to insufficient
resources is threat
research (65% selecting)
#3 highest cybersecurity
challenge today is
keeping current on new
threats and
vulnerabilities (40%
selecting)
Addressing gaps while managing cost and ROI pressures
Watson for cybersecurity unlocks a tremendous amount
of security knowledge enabling rapid and comprehensive
investigation insights
IBM Watson
for cyber security
Corpus of Knowledge
Human Generated
Security Knowledge
and IBM Research
Threat databases
Research reports
Security textbooks
Vulnerability disclosures
Popular websites
Blogs and social activity
Other
Threat databases
Research reports
Security textbooks
Vulnerability disclosures
Popular websites
Blogs and social activity
Other
• Maintains the currency of
• Leverages the power of
collaboration and crowdsourcing
of threat intelligence and
activity for more accurate
insights
• Security Knowledge
• Learns new threat relationships
and behaviors
• Performs cognitive exploration
of suspicious activities and
behaviors identifying root
cause and additional indicators
The Corpus of Watson for CyberSecurity in action
• Continually growing and adapting through
the absorption of new security knowledge
• Performs cognitive exploration of suspicious
activities and behaviors identifying root
cause and additional indicators
• Creates and finds paths and linkages easily
missed by humans
• Learns, adapts and doesn’t forget
Anomaly Detection
Detect and stop advanced threats
Advanced analytics for advanced threat detection
and response across the enterprise
The User Behavior Analytics dashboard
is an integrated part of the QRadar console
Intelligence Response
15 © 2018 IBM Corporation
AI and Orchestration
What if you could augment your teams’ intelligence and response?
Respond quickly with confidence
Orchestrate a complete and dynamic
response, enabling faster, more
intelligent remediation
– Create dynamic playbooks built on NIST / CERT / SANS
– Deploy response procedures and expertise
Rules
Recommendations
SIEM
R
ules
im
port
Script
ARA
Attacker’s Use of AI Today
Attacker’s Use of AI Today
ME: Model Extraction
DE: Data Extraction
Ev: Model Evasion
Po: Model Poisoning
• Generate: DeepHack tool learned
SQL injection [DEFCON’17]
• Automate: generate targeted
phishing attacks on Twitter
[Zerofox Blackhat’16]
• Refine: Neural network powered
password crackers
• Evade: Generative adversarial
networks learn novel
steganographic channels
AI Powered Attacks
• Poison: Microsoft Tay chatbot
poisoning via Twitter (and Watson
“poisoning” from Urban
Dictionary) [Po]
• Evade: Real-world attacks on
computer vision for facial
recognition biometrics [CCS’16]
and autonomous vehicles
[OpenAI] [Ev]
• Harden: Genetic algorithms and
reinforcement learning (OpenAI
Gym) to evade malware detectors
[Blackhat/DEFCON’17] [Ev]
Attacking AI
• Theft: Stealing machine learning
models via public APIs
[USENIX’16] [DE]
• Transferability: Practical black-
box attacks learn surrogate
models for transfer attacks
[ASIACCS’17]
[ME, Ev]
• Privacy: Model inversion attacks
steal training data [CCS’15] [DE]
Theft of AI
Reduce Complexity
2019+
Security at the
Speed of Cloud
OPERATIONAL
SIMPLICITY
GLOBAL-SCALE
AI&ANALYTICS
CONNECTED
ECOSYSTEM
Our continued journey
19
2011-2018
Security connected
across the enterprise
SECURITY
SECURITY
SECURITY
SECURITY
ORCHESTRATION
ORCHESTRATION
ORCHESTRATION
ORCHESTRATION
&ANALYTICS
&ANALYTICS
&ANALYTICS
&ANALYTICS
APPS
APPS
APPS
APPS
MOBILE
MOBILE
MOBILE
MOBILE
ENDPOINT
ENDPOINT
ENDPOINT
ENDPOINT
THREAT
THREAT
THREAT
THREAT
INTEL
INTEL
INTEL
INTEL
NETWORK
NETWORK
NETWORK
NETWORK
ADVANCED
ADVANCED
ADVANCED
ADVANCED
FRAUD
FRAUD
FRAUD
FRAUD
IDENTITY
IDENTITY
IDENTITY
IDENTITY
& ACCESS
& ACCESS
& ACCESS
& ACCESS
DATA
DATA
DATA
DATA
Before 2011
Security for
an IT project
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of
direction represents IBM's current intent, is subject to change or withdrawal,and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines
Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in
information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no
single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will
necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise
immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU
ibm.com/security/community

More Related Content

PDF
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
PDF
IBM Security Strategy Overview
PPTX
Artificial Intelligence in Cybersecurity
PPTX
IBM Security Strategy
PDF
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
PPTX
06. IBM_Bao ve moi truong dam may lai va tri tue nhan tao_IBM.pptx
PDF
Cybersecurity Trends 2024: Protect Your Business from Emerging Threats
PDF
A New Remedy for the Cyber Storm Approaching
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
IBM Security Strategy Overview
Artificial Intelligence in Cybersecurity
IBM Security Strategy
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
06. IBM_Bao ve moi truong dam may lai va tri tue nhan tao_IBM.pptx
Cybersecurity Trends 2024: Protect Your Business from Emerging Threats
A New Remedy for the Cyber Storm Approaching

Similar to AI for Cyber Security and Adversarial AI (20)

PPTX
Overview of Artificial Intelligence in Cybersecurity
PPT
Cognitive security
PPTX
Secure Systems of Engagement
PPTX
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
PDF
cybersecurity-for-ai-and-genai-updated.pdf
PDF
The Security Challenge: What's Next?
PDF
CCA study group
PDF
AI Safety in Parliaments: Latest Standards and Compliance Challenges
PDF
Future Cybersecurity Trends: How Businesses Can Stay Ahead in 2025
PDF
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
PDF
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
PPTX
Aristiun Whitepaper- Automated Threat Modelling with Aribot
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PPTX
Solnet dev secops meetup
PDF
Top Cybersecurity Trends for 2024: Stay Ahead of Emerging Threats
PPTX
4 Ways to Build your Immunity to Cyberthreats
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PDF
2014 the future evolution of cybersecurity
PPTX
First line of defense for cybersecurity : AI
Overview of Artificial Intelligence in Cybersecurity
Cognitive security
Secure Systems of Engagement
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
cybersecurity-for-ai-and-genai-updated.pdf
The Security Challenge: What's Next?
CCA study group
AI Safety in Parliaments: Latest Standards and Compliance Challenges
Future Cybersecurity Trends: How Businesses Can Stay Ahead in 2025
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Aristiun Whitepaper- Automated Threat Modelling with Aribot
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Solnet dev secops meetup
Top Cybersecurity Trends for 2024: Stay Ahead of Emerging Threats
4 Ways to Build your Immunity to Cyberthreats
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
2014 the future evolution of cybersecurity
First line of defense for cybersecurity : AI
Ad

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Spectroscopy.pptx food analysis technology
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Spectroscopy.pptx food analysis technology
Teaching material agriculture food technology
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Ad

AI for Cyber Security and Adversarial AI

  • 1. AI for Cyber Security and Adversarial AI Domenico Raguseo June 2019 @domenicoraguseo IBM Security / © 2019 IBM Corporation
  • 2. 2 © 2018 IBM Corporation Grow Business Stop Threats Prove Compliance Get Ahead of Compliance Enhance Security Hygiene Detect & Stop Advanced Threats Orchestrate Incident Response Master Threat Hunting Secure Hybrid Cloud Protect Critical Assets Prevent Advanced Fraud Govern Users and Identities Let’s focus on the most critical security use cases Outcome Outcome Outcome Outcome- - - -driven driven driven driven security security security security 2 © 2018 IBM Corporation
  • 3. 3 Reactive strategies driven by threats Products and processes deployed in silos Organizations and teams continue to work alone Complexity continues to be today’s top concern
  • 4. 4 © 2018 IBM Corporation SECURITY SECURITY SECURITY SECURITY ORCHESTRATION ORCHESTRATION ORCHESTRATION ORCHESTRATION & ANALYTICS & ANALYTICS & ANALYTICS & ANALYTICS THREAT THREAT THREAT THREAT INTEL INTEL INTEL INTEL ENDPOINT ENDPOINT ENDPOINT ENDPOINT NETWORK NETWORK NETWORK NETWORK MOBILE MOBILE MOBILE MOBILE ADVANCED ADVANCED ADVANCED ADVANCED FRAUD FRAUD FRAUD FRAUD DATA DATA DATA DATA APPS APPS APPS APPS IDENTITY IDENTITY IDENTITY IDENTITY & ACCESS & ACCESS & ACCESS & ACCESS Build an integrated security immune system Criminal detection Fraud protection Data access control Application security management Application scanning Data protection Device management Transaction protection Content security Malware protection Endpoint detection and response Endpoint patching and management Network forensics and threat management Firewalls and intrusion prevention Network visibility and segmentation Access management Identity governance and administration Privileged user management IDaaS Mainframe security Threat sharing Vulnerability management Security analytics Threat and anomaly detection Incident response User behavior analytics Threat hunting and investigation IoCs | |
  • 5. Analysis of an Incident
  • 6. Activities performed during Business Email Compromise – Case A SECURITY SECURITY SECURITY SECURITY ORCHESTRATION ORCHESTRATION ORCHESTRATION ORCHESTRATION & ANALYTICS & ANALYTICS & ANALYTICS & ANALYTICS THREAT THREAT THREAT THREAT INTEL INTEL INTEL INTEL ENDPOIN ENDPOIN ENDPOIN ENDPOINT T T T NETWORK NETWORK NETWORK NETWORK MOBILE MOBILE MOBILE MOBILE ADVANCED ADVANCED ADVANCED ADVANCED FRAUD FRAUD FRAUD FRAUD DATA DATA DATA DATA APPS APPS APPS APPS IDENTITY IDENTITY IDENTITY IDENTITY & ACCESS & ACCESS & ACCESS & ACCESS Data access control Application security management Application scanning Data protection Device management Transaction protection Content security Malware protection Endpoint detection and response Endpoint patching and management Access management IDaaS Mainframe security Threat sharing IoCs | | Email is received with malicious attachment and “payload” macro is executed (malware defenses fail) Unpatched vulnerabilit y is exploited Command and control is allowed to be established Credentia l are stooled Kill Chain – Case A
  • 7. Email is received with malicious attachment and “payload” macro is executed (malware defenses fail) File is Downloade d from a web site SECURITY SECURITY SECURITY SECURITY ORCHESTRATION ORCHESTRATION ORCHESTRATION ORCHESTRATION & ANALYTICS & ANALYTICS & ANALYTICS & ANALYTICS THREAT THREAT THREAT THREAT INTEL INTEL INTEL INTEL ENDPOIN ENDPOIN ENDPOIN ENDPOINT T T T NETWORK NETWORK NETWORK NETWORK MOBILE MOBILE MOBILE MOBILE ADVANCED ADVANCED ADVANCED ADVANCED FRAUD FRAUD FRAUD FRAUD DATA DATA DATA DATA APPS APPS APPS APPS IDENTITY IDENTITY IDENTITY IDENTITY & ACCESS & ACCESS & ACCESS & ACCESS Data access control Application security management Application scanning Data protection Device management Transaction protection Content security Malware protection Endpoint detection and response Endpoint patching and management Access management IDaaS Mainframe security Threat sharing IoCs | | Email is received with malicious attachment and “payload” macro is executed (malware defenses fail) Unpatched vulnerabilit y is exploited Identity and Access Command and control is allowed to be established Watering hole .. A change in attach strategy . Case B Kill Chain - Case B Case B =! Case A Kill Chain – Case A Case B =! Case A Attach Pattern A + B
  • 8. 8 © 2018 IBM Corporation The future of Incident Analysis in Cyber Security is AI Use AI to gain a head start Automatically investigate incidents and anomalies to identify the most likely threats – Quickly gather insights from millions of external sources – Apply cognitive reasoning to build relationships
  • 9. 9 | Welcome to the cognitive era. 9 Incident Analysis #2 most challenging area today is optimizing accuracy alerts (too many false positives) #3 most challenging area due to insufficient resources is threat identification, monitoring and escalating potential incidents (61% selecting) Speed gap The top cybersecurity challenge today and tomorrow is reducing average incident response and resolution time This is despite the fact that 80% said their incident response speed is much faster than two years ago Accuracy gap Intelligence gap #1 most challenging area due to insufficient resources is threat research (65% selecting) #3 highest cybersecurity challenge today is keeping current on new threats and vulnerabilities (40% selecting) Addressing gaps while managing cost and ROI pressures
  • 10. Watson for cybersecurity unlocks a tremendous amount of security knowledge enabling rapid and comprehensive investigation insights IBM Watson for cyber security Corpus of Knowledge Human Generated Security Knowledge and IBM Research Threat databases Research reports Security textbooks Vulnerability disclosures Popular websites Blogs and social activity Other Threat databases Research reports Security textbooks Vulnerability disclosures Popular websites Blogs and social activity Other • Maintains the currency of • Leverages the power of collaboration and crowdsourcing of threat intelligence and activity for more accurate insights • Security Knowledge • Learns new threat relationships and behaviors • Performs cognitive exploration of suspicious activities and behaviors identifying root cause and additional indicators
  • 11. The Corpus of Watson for CyberSecurity in action • Continually growing and adapting through the absorption of new security knowledge • Performs cognitive exploration of suspicious activities and behaviors identifying root cause and additional indicators • Creates and finds paths and linkages easily missed by humans • Learns, adapts and doesn’t forget
  • 13. Detect and stop advanced threats Advanced analytics for advanced threat detection and response across the enterprise The User Behavior Analytics dashboard is an integrated part of the QRadar console
  • 15. 15 © 2018 IBM Corporation AI and Orchestration What if you could augment your teams’ intelligence and response? Respond quickly with confidence Orchestrate a complete and dynamic response, enabling faster, more intelligent remediation – Create dynamic playbooks built on NIST / CERT / SANS – Deploy response procedures and expertise Rules Recommendations SIEM R ules im port Script ARA
  • 17. Attacker’s Use of AI Today ME: Model Extraction DE: Data Extraction Ev: Model Evasion Po: Model Poisoning • Generate: DeepHack tool learned SQL injection [DEFCON’17] • Automate: generate targeted phishing attacks on Twitter [Zerofox Blackhat’16] • Refine: Neural network powered password crackers • Evade: Generative adversarial networks learn novel steganographic channels AI Powered Attacks • Poison: Microsoft Tay chatbot poisoning via Twitter (and Watson “poisoning” from Urban Dictionary) [Po] • Evade: Real-world attacks on computer vision for facial recognition biometrics [CCS’16] and autonomous vehicles [OpenAI] [Ev] • Harden: Genetic algorithms and reinforcement learning (OpenAI Gym) to evade malware detectors [Blackhat/DEFCON’17] [Ev] Attacking AI • Theft: Stealing machine learning models via public APIs [USENIX’16] [DE] • Transferability: Practical black- box attacks learn surrogate models for transfer attacks [ASIACCS’17] [ME, Ev] • Privacy: Model inversion attacks steal training data [CCS’15] [DE] Theft of AI
  • 19. 2019+ Security at the Speed of Cloud OPERATIONAL SIMPLICITY GLOBAL-SCALE AI&ANALYTICS CONNECTED ECOSYSTEM Our continued journey 19 2011-2018 Security connected across the enterprise SECURITY SECURITY SECURITY SECURITY ORCHESTRATION ORCHESTRATION ORCHESTRATION ORCHESTRATION &ANALYTICS &ANALYTICS &ANALYTICS &ANALYTICS APPS APPS APPS APPS MOBILE MOBILE MOBILE MOBILE ENDPOINT ENDPOINT ENDPOINT ENDPOINT THREAT THREAT THREAT THREAT INTEL INTEL INTEL INTEL NETWORK NETWORK NETWORK NETWORK ADVANCED ADVANCED ADVANCED ADVANCED FRAUD FRAUD FRAUD FRAUD IDENTITY IDENTITY IDENTITY IDENTITY & ACCESS & ACCESS & ACCESS & ACCESS DATA DATA DATA DATA Before 2011 Security for an IT project
  • 20. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal,and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU ibm.com/security/community