SlideShare a Scribd company logo
Arm the World with SPN based Security
Liwei Ren, Ph.D
San Jose, California, Oct 2016
Copyright 2016 Trend Micro Inc.2
My Background
I am a research scientist
– Deep learning
– Data security, cloud security, IoT security
– Practical algorithms, data compression, stringology
Education
– Ph.D in mathematics and MS in information science, University of Pittsburgh
– MS and BS in mathematics, Tsinghua University
Measurable contributions to the world
– 1 startup Provilla™ that was acquired by Trend Micro™
– 27 US patents granted
– 16 invited talks at top universities and noted conferences (2012-2016)
– 10 published papers in mathematics
Copyright 2016 Trend Micro Inc.3
Defense Systems in Wars
Trend Micro’s mission:
– to arm the digital world with advanced
defense systems
Copyright 2016 Trend Micro Inc.4
Defense Systems in Wars
Trend Micro’s mission:
– to arm the digital world with advanced
defense systems
Copyright 2016 Trend Micro Inc.5
Defense Systems in Wars
• The most advanced defense system in the world today
• National Missile Defense (NMD)
Copyright 2016 Trend Micro Inc.6
Defense Systems in Wars
How about this architecture of defense ?
Copyright 2016 Trend Micro Inc.7
SPN Security Architecture
SPN is a cloud based security architecture powered by
– Cloud platform
– Big data infrastructure, analytics and machine learning capability
– Global threat intelligence
– Multiple security services of different focuses
Arm the World with SPN based Security
Copyright 2016 Trend Micro Inc.9
Smart Protection Network Security Architecture
The evolution of SPN:
Copyright 2016 Trend Micro Inc.10
Deep Learning and Cyber-security
• Deep learning is a machine learning technique based on deep neural network.
• Deep neural network (DNN) is an artificial neural network (ANN) with at least
one hidden layer :
Copyright 2016 Trend Micro Inc.11
Deep Learning and Cyber-security
• Viewing deep neural networks (DNN) with a taxonomy
Copyright 2016 Trend Micro Inc.12
Deep Learning and Cyber-security
• Solving challenging problems with DNNs
Copyright 2016 Trend Micro Inc.13
Deep Learning and Cyber-security
We have many challenging problems in cybersecurity
Copyright 2016 Trend Micro Inc.14
Summary
• We used the National Missile Defense (NMD) to analogically introduce our cloud
based security architecture SPN
• A high level description of SPN with its major capabilities and security services
• A brief history of SPN
• Further advancing SPN with deep neural networks (DNN)

More Related Content

PDF
IoT Security: Problems, Challenges and Solutions
PPTX
IoT Security: Cases and Methods
PPTX
Practical IoT Security in the Enterprise
PPTX
IoT Security Imperative: Stop your Fridge from Sending you Spam
PPTX
What is a blockchain api how can you integrate in your website
PPTX
IoT Security Training, IoT Security Awareness 2019
PDF
IoT Security and Privacy Considerations
PPTX
Iot(security)
IoT Security: Problems, Challenges and Solutions
IoT Security: Cases and Methods
Practical IoT Security in the Enterprise
IoT Security Imperative: Stop your Fridge from Sending you Spam
What is a blockchain api how can you integrate in your website
IoT Security Training, IoT Security Awareness 2019
IoT Security and Privacy Considerations
Iot(security)

What's hot (20)

PDF
BlockchainLAB Hackathon
PDF
Blockchain spreads
PDF
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
PPTX
Creating the open source building blocks for IoT
PPTX
The Future of Embedded and IoT Security: Kaspersky Operating System
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PPTX
Your Thing is Pwned - Security Challenges for the IoT
PDF
IoT – Breaking Bad
PPTX
IoT Broker
PPTX
IoT Security: Cases and Methods [CON5446]
PPTX
security and privacy-Internet of things
PPTX
IoT Security
PPTX
Iot security amar prusty
PPTX
WSO2 IoT Server and Device Cloud
PPTX
Eclipse IoT for Industry 4.0
PDF
Safety reliability and security lessons from defense for IoT
PPTX
Internet of everything #IoE
PPTX
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for business
PDF
(SACON) Vandana Verma - Living In A World of Zero Trust
PPTX
IoT Security Awareness Training : Tonex Training
BlockchainLAB Hackathon
Blockchain spreads
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
Creating the open source building blocks for IoT
The Future of Embedded and IoT Security: Kaspersky Operating System
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Your Thing is Pwned - Security Challenges for the IoT
IoT – Breaking Bad
IoT Broker
IoT Security: Cases and Methods [CON5446]
security and privacy-Internet of things
IoT Security
Iot security amar prusty
WSO2 IoT Server and Device Cloud
Eclipse IoT for Industry 4.0
Safety reliability and security lessons from defense for IoT
Internet of everything #IoE
Creator Ci40 IoT kit & Framework - scalable LWM2M IoT dev platform for business
(SACON) Vandana Verma - Living In A World of Zero Trust
IoT Security Awareness Training : Tonex Training
Ad

Similar to Arm the World with SPN based Security (19)

PDF
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
PDF
Too soft[ware defined] networks SD-Wan vulnerability assessment
PDF
TrendMicro - Security Designed for the Software-Defined Data Center
PDF
Software Defined Networking (SDN) with VMware NSX
PDF
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
PPSX
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
PPT
Sensor nets the business of surveillance
PDF
Review Paper on Predicting Network Attack Patterns in SDN using ML
PPTX
ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...
PDF
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
PDF
Security and risk analysis in the cloud with software defined networking arch...
PDF
Deep Learning Neural Networks in the Cloud
PDF
SDN Security: Two Sides of the Same Coin
PDF
Deep Learning for Cybersecurity Innovation Insights from Patents
DOCX
PPTX
nsx overview with use cases 1.0
PPTX
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
DOCX
PPTX
Using sdn to secure the campus - Networkshop44
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
Too soft[ware defined] networks SD-Wan vulnerability assessment
TrendMicro - Security Designed for the Software-Defined Data Center
Software Defined Networking (SDN) with VMware NSX
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Sensor nets the business of surveillance
Review Paper on Predicting Network Attack Patterns in SDN using ML
ICCIT_NSU_Comparative Security Analysis of Software Defined Wireless Networki...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
Security and risk analysis in the cloud with software defined networking arch...
Deep Learning Neural Networks in the Cloud
SDN Security: Two Sides of the Same Coin
Deep Learning for Cybersecurity Innovation Insights from Patents
nsx overview with use cases 1.0
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
Using sdn to secure the campus - Networkshop44
Ad

More from Liwei Ren任力偉 (20)

PDF
信息安全领域里的创新和机遇
PDF
企业安全市场综述
PDF
Introduction to Deep Neural Network
PDF
聊一聊大明朝的火器
PDF
防火牆們的故事
PDF
移动互联网时代下创新的思维
PDF
硅谷的那点事儿
PDF
非齐次特征值问题解存在性研究
PDF
世纪猜想
PDF
Extending Boyer-Moore Algorithm to an Abstract String Matching Problem
PDF
Near Duplicate Document Detection: Mathematical Modeling and Algorithms
PDF
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...
PDF
Phase locking in chains of multiple-coupled oscillators
PDF
On existence of the solution of inhomogeneous eigenvalue problem
PDF
Math stories
PDF
Binary Similarity : Theory, Algorithms and Tool Evaluation
PDF
Taxonomy of Differential Compression
PDF
Bytewise Approximate Match: Theory, Algorithms and Applications
PDF
Overview of Data Loss Prevention (DLP) Technology
PDF
DLP Systems: Models, Architecture and Algorithms
信息安全领域里的创新和机遇
企业安全市场综述
Introduction to Deep Neural Network
聊一聊大明朝的火器
防火牆們的故事
移动互联网时代下创新的思维
硅谷的那点事儿
非齐次特征值问题解存在性研究
世纪猜想
Extending Boyer-Moore Algorithm to an Abstract String Matching Problem
Near Duplicate Document Detection: Mathematical Modeling and Algorithms
Monotonicity of Phaselocked Solutions in Chains and Arrays of Nearest-Neighbo...
Phase locking in chains of multiple-coupled oscillators
On existence of the solution of inhomogeneous eigenvalue problem
Math stories
Binary Similarity : Theory, Algorithms and Tool Evaluation
Taxonomy of Differential Compression
Bytewise Approximate Match: Theory, Algorithms and Applications
Overview of Data Loss Prevention (DLP) Technology
DLP Systems: Models, Architecture and Algorithms

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PDF
Modernizing your data center with Dell and AMD
PDF
cuic standard and advanced reporting.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Cloud computing and distributed systems.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
Modernizing your data center with Dell and AMD
cuic standard and advanced reporting.pdf
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Monthly Chronicles - July 2025
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MYSQL Presentation for SQL database connectivity
Cloud computing and distributed systems.
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Arm the World with SPN based Security

  • 1. Arm the World with SPN based Security Liwei Ren, Ph.D San Jose, California, Oct 2016
  • 2. Copyright 2016 Trend Micro Inc.2 My Background I am a research scientist – Deep learning – Data security, cloud security, IoT security – Practical algorithms, data compression, stringology Education – Ph.D in mathematics and MS in information science, University of Pittsburgh – MS and BS in mathematics, Tsinghua University Measurable contributions to the world – 1 startup Provilla™ that was acquired by Trend Micro™ – 27 US patents granted – 16 invited talks at top universities and noted conferences (2012-2016) – 10 published papers in mathematics
  • 3. Copyright 2016 Trend Micro Inc.3 Defense Systems in Wars Trend Micro’s mission: – to arm the digital world with advanced defense systems
  • 4. Copyright 2016 Trend Micro Inc.4 Defense Systems in Wars Trend Micro’s mission: – to arm the digital world with advanced defense systems
  • 5. Copyright 2016 Trend Micro Inc.5 Defense Systems in Wars • The most advanced defense system in the world today • National Missile Defense (NMD)
  • 6. Copyright 2016 Trend Micro Inc.6 Defense Systems in Wars How about this architecture of defense ?
  • 7. Copyright 2016 Trend Micro Inc.7 SPN Security Architecture SPN is a cloud based security architecture powered by – Cloud platform – Big data infrastructure, analytics and machine learning capability – Global threat intelligence – Multiple security services of different focuses
  • 9. Copyright 2016 Trend Micro Inc.9 Smart Protection Network Security Architecture The evolution of SPN:
  • 10. Copyright 2016 Trend Micro Inc.10 Deep Learning and Cyber-security • Deep learning is a machine learning technique based on deep neural network. • Deep neural network (DNN) is an artificial neural network (ANN) with at least one hidden layer :
  • 11. Copyright 2016 Trend Micro Inc.11 Deep Learning and Cyber-security • Viewing deep neural networks (DNN) with a taxonomy
  • 12. Copyright 2016 Trend Micro Inc.12 Deep Learning and Cyber-security • Solving challenging problems with DNNs
  • 13. Copyright 2016 Trend Micro Inc.13 Deep Learning and Cyber-security We have many challenging problems in cybersecurity
  • 14. Copyright 2016 Trend Micro Inc.14 Summary • We used the National Missile Defense (NMD) to analogically introduce our cloud based security architecture SPN • A high level description of SPN with its major capabilities and security services • A brief history of SPN • Further advancing SPN with deep neural networks (DNN)