SlideShare a Scribd company logo
AI & ML in Cyber Security
Welcome Back To 1999 - Security Hasn’t Changed
Raffael Marty
VP Security Analytics
BSides Vancouver
March 2017
Disclaimer
© Raffael Marty 2
"This presentation was prepared solely by Raffael
Marty in his personal capacity. The material, views,
and opinions expressed in this presentation are the
author's own and do not reflect the views of Sophos
Ltd. or its affiliates."
Raffael Marty
• Sophos
• PixlCloud
• Loggly
• Splunk
• ArcSight
• IBM Research
• SecViz
• Logging
• Big Data
• SIEM
• Leadership
• Zen
My Provocative Premise
• Cyber Defense / Monitoring / Analytics is still at the level of 1999
• We can’t predict the weather and we have done it since 1 August 1861
o “The weather predicted by the BBC for four days time was just 30-40% accurate”
• Predicting election results anyone?
o “80% chance Clinton will win.”
Outline
5
• Nothing Has Changed in Security (Defense)
• Machine Learning & Artificial Intelligence
• Visualization
• Now What?
Nothing Has Changed in Security
Since 1999
Summary of Technologies
• Firewalls – policy management, auditing a challenge
• IDS/IPS – false positives
• Threat Intelligence – really the same as IDS signatures
• DLP – just an IDS engine
• Vulnerability Scanners – what’s up with those old user interfaces?
• SIEM – still the same issues: parsing, context, prioritization
• Security Analytics – can actually mostly be done with your SIEM
Machine
Learning
8http://theconversation.com/your-questions-answered-on-artificial-intelligence-49645
& Artificial
Intelligence
Is this the answer to all of our
security problems? Is ML and AI
what we have been waiting for?
Definitions
•Statistics - quantifies numbers
•Data Mining - explains patterns
•Machine Learning - predicts with models
•Artificial Intelligence - behaves and reasons
Machine Learning / Data Mining
10
• Anomaly detection (outlier detection)
o What’s “normal”?
• Association rule learning (e.g., items purchased together)
• Clustering
• Classification
• Regression (model the data)
• Summarization
Data Mining in Security
The graph shows an abstract
space with colors being machine
identified clusters.
Machine Learning in Security
•Needs a corpus of data to learn from
•Network traffic analysis
still not working
oNo labeled data
o Not sure what the right
features should be
•Works okay for SPAM
and malware
classification
Artificial Intelligence in Security
•Just calling something AI doesn’t make it AI.
”A program that doesn't simply classify or compute model
parameters, but comes up with novel knowledge that a
security analyst finds insightful.”
Artificial Narrow Intelligence (ANI)
• Computer programs we have today that perform a specific, narrow task: Deep Blue, Amazon recommendations
Artificial General Intelligence (AGI)
• A program that could learn to complete any task
• What many of us imagine when we think of AI, but no one has managed to accomplish it yet
Artificial Superintelligence (ASI)
• Any computer program that is all-around smarter than a human (also see the singularity by Ray Kurzweil)
https://www.chemheritage.org/distillations/magazine/thinking-machines-the-search-for-artificial-intelligence
The Law of Accelerating Returns – Ray Kurzweil
http://waitbutwhy.com/2015/01/artificial-intelligence-revolution-1.html
ML Looses
15
• We have tried many thing:
o Social Network Analysis
o Seasonality detection
o Entropy over time
o Frequent pattern mining
o Clustering
• All kinds of challenges
o Characterize normal
o Extract what has been learned
o Statistical vs. domain anomalies
• Simple works!
Simple - Data Abstraction
16
Simple Works - Monitor Password Resets
17
threshold
outliers have different magnitudes
Approximate Curve
18
fitting a curve distance to curve
Data Mining Applied
19
• Some would sell this as AI
better
threshold
2
0
Simple Works –
Visualization
S e c u r i t y . A n a l y t i c s . I n s i g h t .
“How Can We See,
Not To Confirm - But
To Learn”
- Edward Tufte
Why Visualization?
22
dport
time
Areas To Explore
• Environment specific rather than environment agnostic approaches
o Same IDS signatures for everyone? Same SIEM signatures?
o Real-time threat intel sharing
• Context
o Users don’t think in IP addresses, they think about users
o Topology mapping anyone?
o User-based policies, not machine based
o Adaptive security
• Capture expert knowledge
o Collaborative efforts
• Forget about 3D visualization 😊
Promising Approaches That Will “Change” Security
• Continuous authentication
• Dynamic policy decisions – automation – really closing the loop
o But what products do this well? Open APIs, low f/p, etc.
• Micro segmentation (including SDN?)
• Real-time threat intelligence sharing
• Human assisted machine learning systems
• Crowd sourcing
• End-user involved / assisted decision making
• Eradicate phishing, please!
How Will ML / AI Help?
• Machine learning consists of algorithms that need data
o Garbage in - garbage out
o Data formats and semantics
• Deep learning is just another ML algorithm
o Malware classification (it isn’t necessarily better than other ML algorithms)
o Basically eliminates the feature engineering step
• Many inherent challenges (see https://www.youtube.com/watch?v=CEAMF0TaUUU)
o Distance functions
o Context – need input from HR systems and others
o Choice of algorithm
o Etc.
• Where to use ML
o Classification problems (traffic, binaries, activities, etc.)
o There is good work being done on automating the level 1 analyst
o Look for systems that leverage humans in the loop (see topic of knowledge capture)
Security Visualization Community
26
• http://secviz.org
• List: secviz.org/mailinglist
• Twitter: @secviz
Share, discuss, challenge, and learn about security visualization.
27
Visual Analytics -
Delivering Actionable Security
Intelligence
July 22-25 2017, Las Vegas
big data | analytics | visualization
BlackHat Workshop
Sophos – Security Made Simple
28
• Products usable by non experts
delightful for the security analyst
• Consolidating security capabilities
• Data science to SOLVE problems
not to highlight issues
Analytics
UTM/Next-Gen Firewall
Wireless
Web
Email
Disk Encryption
File Encryption
Endpoint /
Next-Gen Endpoint
Mobile
Server
Sophos Central
Questions?
29
http://slideshare.net/zrlram
@raffaelmarty

More Related Content

PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
PDF
Practical Applications of Machine Learning in Cybersecurity
PDF
Machine Learning in Cyber Security Domain
PPTX
Application of Machine Learning in Cybersecurity
PDF
How Machine Learning & AI Will Improve Cyber Security
PDF
AI and Cybersecurity - Food for Thought
PPTX
Machine learning in Cyber Security
PDF
Security in the age of Artificial Intelligence
AI & ML in Cyber Security - Why Algorithms are Dangerous
Practical Applications of Machine Learning in Cybersecurity
Machine Learning in Cyber Security Domain
Application of Machine Learning in Cybersecurity
How Machine Learning & AI Will Improve Cyber Security
AI and Cybersecurity - Food for Thought
Machine learning in Cyber Security
Security in the age of Artificial Intelligence

What's hot (20)

PPTX
Use of Artificial Intelligence in Cyber Security - Avantika University
PDF
Artificial Intelligence for Cyber Security
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PDF
What is SIEM? A Brilliant Guide to the Basics
PPTX
“AI techniques in cyber-security applications”. Flammini lnu susec19
PPTX
AI and ML in Cybersecurity
PPTX
Overview of Artificial Intelligence in Cybersecurity
PDF
Soc and siem and threat hunting
PPTX
AI and the Impact on Cybersecurity
PDF
IBM QRadar Security Intelligence Overview
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PDF
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
PDF
Security and Privacy of Machine Learning
PPTX
Rothke rsa 2012 building a security operations center (soc)
PPTX
When Cyber Security Meets Machine Learning
PPTX
How is ai important to the future of cyber security
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
Cyber Threat Intelligence - It's not just about the feeds
PPTX
Security Information and Event Management (SIEM)
Use of Artificial Intelligence in Cyber Security - Avantika University
Artificial Intelligence for Cyber Security
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
What is SIEM? A Brilliant Guide to the Basics
“AI techniques in cyber-security applications”. Flammini lnu susec19
AI and ML in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
Soc and siem and threat hunting
AI and the Impact on Cybersecurity
IBM QRadar Security Intelligence Overview
Top Cybersecurity Threats and How SIEM Protects Against Them
Threat Hunting - Moving from the ad hoc to the formal
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
Security and Privacy of Machine Learning
Rothke rsa 2012 building a security operations center (soc)
When Cyber Security Meets Machine Learning
How is ai important to the future of cyber security
Effective Threat Hunting with Tactical Threat Intelligence
Cyber Threat Intelligence - It's not just about the feeds
Security Information and Event Management (SIEM)
Ad

Viewers also liked (20)

PDF
Security Insights at Scale
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PDF
AfterGlow
PDF
Visualization in the Age of Big Data
PDF
Workshop: Big Data Visualization for Security
PDF
Cyber Security – How Visual Analytics Unlock Insight
PPTX
3Com 023-11705-0001
PPT
RSA 2006 - Visual Security Event Analysis
PDF
Sisu - 2º remanejamento UPE
PDF
Arquitectura
PPTX
Suomi nyt
PDF
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
PPTX
Ніна Матвієнко
PPTX
Незалежність
PPTX
In-Memory Computing Webcast. Market Predictions 2017
PDF
Real-Time Analytics with Confluent and MemSQL
PPTX
Azure iot
PDF
Big Data Visualization
PPT
Library 2.0: Opportunities and Challenges
Security Insights at Scale
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
AfterGlow
Visualization in the Age of Big Data
Workshop: Big Data Visualization for Security
Cyber Security – How Visual Analytics Unlock Insight
3Com 023-11705-0001
RSA 2006 - Visual Security Event Analysis
Sisu - 2º remanejamento UPE
Arquitectura
Suomi nyt
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
Ніна Матвієнко
Незалежність
In-Memory Computing Webcast. Market Predictions 2017
Real-Time Analytics with Confluent and MemSQL
Azure iot
Big Data Visualization
Library 2.0: Opportunities and Challenges
Ad

Similar to AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed (20)

PPTX
Delivering Security Insights with Data Analytics and Visualization
PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
PPTX
Leveraging Machine Learning to Enhance Cybersecurity v2.pptx
PDF
influence of AI in IS
PDF
AI & ML in Cyber Security - Why Algorithms Are Dangerous
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
PDF
BSidesLV 2013 - Using Machine Learning to Support Information Security
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PPTX
Machine Learning in Information Security by Mohammed Zuber
PDF
AI in security
PPTX
BsidesLVPresso2016_JZeditsv6
PPTX
Machine learning and artificial intelligence as powerful cybersecurity tools
PPTX
AI for improved surveillance & cybersecurity
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
PPTX
Security Analytics Beyond Cyber
PPTX
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
PDF
CIS AIML Beginners Series Part 1
PDF
AI & Machine Learning - Etienne Greeff - SecureData
PPTX
Pushing Machine Learning Down the Security Stack to Make It More Effective fo...
PPTX
icon-aiincs-obusolini201809131800-190310184140.pptx
Delivering Security Insights with Data Analytics and Visualization
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Leveraging Machine Learning to Enhance Cybersecurity v2.pptx
influence of AI in IS
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Artificial Intelligence – Time Bomb or The Promised Land?
BSidesLV 2013 - Using Machine Learning to Support Information Security
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Machine Learning in Information Security by Mohammed Zuber
AI in security
BsidesLVPresso2016_JZeditsv6
Machine learning and artificial intelligence as powerful cybersecurity tools
AI for improved surveillance & cybersecurity
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
Security Analytics Beyond Cyber
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
CIS AIML Beginners Series Part 1
AI & Machine Learning - Etienne Greeff - SecureData
Pushing Machine Learning Down the Security Stack to Make It More Effective fo...
icon-aiincs-obusolini201809131800-190310184140.pptx

More from Raffael Marty (16)

PDF
Exploring the Defender's Advantage
PPTX
How To Drive Value with Security Data
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
PDF
Understanding the "Intelligence" in AI
PDF
Security Chat 5.0
PDF
The Heatmap
 - Why is Security Visualization so Hard?
PDF
Visualization for Security
PDF
The Heatmap
 - Why is Security Visualization so Hard?
PDF
DAVIX - Data Analysis and Visualization Linux
PDF
Cloud - Security - Big Data
PDF
Supercharging Visualization with Data Mining
PDF
Security Visualization - Let's Take A Step Back
PDF
Visual Analytics and Security Intelligence
PPT
Log Visualization - Bellua BCS 2006
PPT
Event Graphs - EUSecWest 2006
PDF
Insider Threat Visualization - HackInTheBox 2007
Exploring the Defender's Advantage
How To Drive Value with Security Data
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Understanding the "Intelligence" in AI
Security Chat 5.0
The Heatmap
 - Why is Security Visualization so Hard?
Visualization for Security
The Heatmap
 - Why is Security Visualization so Hard?
DAVIX - Data Analysis and Visualization Linux
Cloud - Security - Big Data
Supercharging Visualization with Data Mining
Security Visualization - Let's Take A Step Back
Visual Analytics and Security Intelligence
Log Visualization - Bellua BCS 2006
Event Graphs - EUSecWest 2006
Insider Threat Visualization - HackInTheBox 2007

Recently uploaded (20)

PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
SAP Ariba Sourcing PPT for learning material
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
DOCX
Unit-3 cyber security network security of internet system
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
innovation process that make everything different.pptx
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Digital Literacy And Online Safety on internet
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Introduction to the IoT system, how the IoT system works
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Power Point - Lesson 3_2.pptx grad school presentation
Exploring VPS Hosting Trends for SMBs in 2025
An introduction to the IFRS (ISSB) Stndards.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
SAP Ariba Sourcing PPT for learning material
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Unit-3 cyber security network security of internet system
Module 1 - Cyber Law and Ethics 101.pptx
Sims 4 Historia para lo sims 4 para jugar
Slides PPTX World Game (s) Eco Economic Epochs.pptx
innovation process that make everything different.pptx
newyork.pptxirantrafgshenepalchinachinane
Digital Literacy And Online Safety on internet
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Job_Card_System_Styled_lorem_ipsum_.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Introduction to the IoT system, how the IoT system works
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION

AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed

  • 1. AI & ML in Cyber Security Welcome Back To 1999 - Security Hasn’t Changed Raffael Marty VP Security Analytics BSides Vancouver March 2017
  • 2. Disclaimer © Raffael Marty 2 "This presentation was prepared solely by Raffael Marty in his personal capacity. The material, views, and opinions expressed in this presentation are the author's own and do not reflect the views of Sophos Ltd. or its affiliates."
  • 3. Raffael Marty • Sophos • PixlCloud • Loggly • Splunk • ArcSight • IBM Research • SecViz • Logging • Big Data • SIEM • Leadership • Zen
  • 4. My Provocative Premise • Cyber Defense / Monitoring / Analytics is still at the level of 1999 • We can’t predict the weather and we have done it since 1 August 1861 o “The weather predicted by the BBC for four days time was just 30-40% accurate” • Predicting election results anyone? o “80% chance Clinton will win.”
  • 5. Outline 5 • Nothing Has Changed in Security (Defense) • Machine Learning & Artificial Intelligence • Visualization • Now What?
  • 6. Nothing Has Changed in Security Since 1999
  • 7. Summary of Technologies • Firewalls – policy management, auditing a challenge • IDS/IPS – false positives • Threat Intelligence – really the same as IDS signatures • DLP – just an IDS engine • Vulnerability Scanners – what’s up with those old user interfaces? • SIEM – still the same issues: parsing, context, prioritization • Security Analytics – can actually mostly be done with your SIEM
  • 8. Machine Learning 8http://theconversation.com/your-questions-answered-on-artificial-intelligence-49645 & Artificial Intelligence Is this the answer to all of our security problems? Is ML and AI what we have been waiting for?
  • 9. Definitions •Statistics - quantifies numbers •Data Mining - explains patterns •Machine Learning - predicts with models •Artificial Intelligence - behaves and reasons
  • 10. Machine Learning / Data Mining 10 • Anomaly detection (outlier detection) o What’s “normal”? • Association rule learning (e.g., items purchased together) • Clustering • Classification • Regression (model the data) • Summarization
  • 11. Data Mining in Security The graph shows an abstract space with colors being machine identified clusters.
  • 12. Machine Learning in Security •Needs a corpus of data to learn from •Network traffic analysis still not working oNo labeled data o Not sure what the right features should be •Works okay for SPAM and malware classification
  • 13. Artificial Intelligence in Security •Just calling something AI doesn’t make it AI. ”A program that doesn't simply classify or compute model parameters, but comes up with novel knowledge that a security analyst finds insightful.” Artificial Narrow Intelligence (ANI) • Computer programs we have today that perform a specific, narrow task: Deep Blue, Amazon recommendations Artificial General Intelligence (AGI) • A program that could learn to complete any task • What many of us imagine when we think of AI, but no one has managed to accomplish it yet Artificial Superintelligence (ASI) • Any computer program that is all-around smarter than a human (also see the singularity by Ray Kurzweil) https://www.chemheritage.org/distillations/magazine/thinking-machines-the-search-for-artificial-intelligence
  • 14. The Law of Accelerating Returns – Ray Kurzweil http://waitbutwhy.com/2015/01/artificial-intelligence-revolution-1.html
  • 15. ML Looses 15 • We have tried many thing: o Social Network Analysis o Seasonality detection o Entropy over time o Frequent pattern mining o Clustering • All kinds of challenges o Characterize normal o Extract what has been learned o Statistical vs. domain anomalies • Simple works!
  • 16. Simple - Data Abstraction 16
  • 17. Simple Works - Monitor Password Resets 17 threshold outliers have different magnitudes
  • 18. Approximate Curve 18 fitting a curve distance to curve
  • 19. Data Mining Applied 19 • Some would sell this as AI better threshold
  • 21. S e c u r i t y . A n a l y t i c s . I n s i g h t . “How Can We See, Not To Confirm - But To Learn” - Edward Tufte
  • 23. Areas To Explore • Environment specific rather than environment agnostic approaches o Same IDS signatures for everyone? Same SIEM signatures? o Real-time threat intel sharing • Context o Users don’t think in IP addresses, they think about users o Topology mapping anyone? o User-based policies, not machine based o Adaptive security • Capture expert knowledge o Collaborative efforts • Forget about 3D visualization 😊
  • 24. Promising Approaches That Will “Change” Security • Continuous authentication • Dynamic policy decisions – automation – really closing the loop o But what products do this well? Open APIs, low f/p, etc. • Micro segmentation (including SDN?) • Real-time threat intelligence sharing • Human assisted machine learning systems • Crowd sourcing • End-user involved / assisted decision making • Eradicate phishing, please!
  • 25. How Will ML / AI Help? • Machine learning consists of algorithms that need data o Garbage in - garbage out o Data formats and semantics • Deep learning is just another ML algorithm o Malware classification (it isn’t necessarily better than other ML algorithms) o Basically eliminates the feature engineering step • Many inherent challenges (see https://www.youtube.com/watch?v=CEAMF0TaUUU) o Distance functions o Context – need input from HR systems and others o Choice of algorithm o Etc. • Where to use ML o Classification problems (traffic, binaries, activities, etc.) o There is good work being done on automating the level 1 analyst o Look for systems that leverage humans in the loop (see topic of knowledge capture)
  • 26. Security Visualization Community 26 • http://secviz.org • List: secviz.org/mailinglist • Twitter: @secviz Share, discuss, challenge, and learn about security visualization.
  • 27. 27 Visual Analytics - Delivering Actionable Security Intelligence July 22-25 2017, Las Vegas big data | analytics | visualization BlackHat Workshop
  • 28. Sophos – Security Made Simple 28 • Products usable by non experts delightful for the security analyst • Consolidating security capabilities • Data science to SOLVE problems not to highlight issues Analytics UTM/Next-Gen Firewall Wireless Web Email Disk Encryption File Encryption Endpoint / Next-Gen Endpoint Mobile Server Sophos Central

Editor's Notes

  • #2: Have a story ready as an intro! Link that to point B (investment)
  • #11: What is Data Mining?
  • #26: `