artificial intelligence in cyber security · neural networks natural language processing...
TRANSCRIPT
![Page 1: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/1.jpg)
Artificial Intelligence in Cyber SecurityPanacea, Pandora's Box or Nothing New under the Sun?
October 1st, 12:20-13:00
![Page 2: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/2.jpg)
2
![Page 3: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/3.jpg)
3Photo by Hitesh Choudhary on Unsplash
![Page 4: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/4.jpg)
4Photo by Louis Hansel on Unsplash
![Page 5: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/5.jpg)
5Photo by Alex Knight on UnsplashPhoto by Jens Johnsson on Unsplash
![Page 6: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/6.jpg)
6Photo by Todd Quackenbush on Unsplash
![Page 7: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/7.jpg)
7
Deep learning
Machine learning Random forest
K-nearest neighbors
Genetic algorithms
Linear regression
Logistic regression
Markov chainsNeural networks
Natural Language Processing
Reinforcement
learning
Techniques for narrow AI (AI Bingo!)
![Page 8: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/8.jpg)
Machine learning
8
UnsupervisedSupervised
Pre-labeled
‘ground truth’
Discover
commonalities &
outliers
![Page 9: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/9.jpg)
Today’s services and products with narrow AI tools• Personal assistants
• Recommendation services
• Autonomous vehicles
• Data (image, audio, video, text) recognition/generation
9
![Page 10: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/10.jpg)
• Large datasets of adequate quality
• Algorithms to create a model or existing models to ‘learn’ and act
AI ingredients
• Large processing capacity
10
![Page 11: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/11.jpg)
11Photo by Maarten van den Heuvel on Unsplash
AI in cyber security
![Page 12: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/12.jpg)
AI: Cyber security activities cheaper and at scale
12
Marginal costs
Scale Scale
Performance
![Page 13: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/13.jpg)
13 Defender has advantage
Attacker has advantage
Human
vulnerabilityTechnical
vulnerability
![Page 14: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/14.jpg)
Titel | Datum14Photo by Olav Ahrens Røtne on Unsplash
Existing cyber security challenges
![Page 15: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/15.jpg)
Automated vulnerability detection
15Photo by Chris Ried on Unsplash
![Page 16: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/16.jpg)
Automated vulnerability detection with AI
• Examples:- Learning the patterns of security vulnerabilities directly from code using natural
language processing (NLP) (Russell et al. 2018)
- Automated software vulnerability detection with machine learning (Harer et al. 2018) - Machine Learning Methods for Software Vulnerability Detection (Chernis, Verma 2018)
- Pattern-Based Vulnerability Discovery (Yamaguchi 2015)
16
Vulnerability dataset
Feature extraction
Train model Apply to code
Update classifierStatic
analysisDynamic analysis
![Page 17: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/17.jpg)
Automated vulnerability detection with AI
• Benefits both attackers and defenders
• Reliable vulnerability datasets for training are a challenge
• AI is an addition to existing working methods
17
![Page 18: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/18.jpg)
18Photo by Marc A on Unsplash
Mass scale spear phishing
![Page 19: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/19.jpg)
Mass scale spear phishing with AI
• Automatically acquire targets through social media mining
• Automatically create spear phishing message based on social media content
• Example:- Generative Models for Spear Phishing Posts on Social
Media (Seymour and Tully 2018)
19
![Page 20: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/20.jpg)
Mass scale spear phishing with AI
• Attackers benefits
• Targets human vulnerability
• Economies of scale for the attacker
• Detection of automatically generated text? (GLTR)
Titel | Datum20
![Page 21: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/21.jpg)
Network and host based detection
21
![Page 22: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/22.jpg)
Network and host based detection with AI
• Detection usually based on profiles of ‘normal behavior’ given a certain context
• Defining outliers with unsupervised learning is still a challenge
• Useful to prioritize possible anomalies and to increase detection rates through human-computer cooperation (SIEM/SOC)
22
![Page 23: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/23.jpg)
23 Photo by Olav Ahrens Røtne on Unsplash
New cyber security challenges caused by AI
![Page 24: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/24.jpg)
Deepfakes: social engineering on steroids
24
https://ThisPersonDoesNotExist.com/
![Page 25: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/25.jpg)
Social engineering on steroids
25
![Page 26: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/26.jpg)
Social engineering with AI
• Mostly used: generative adversarial networks
• Costs of model creation decreasing rapidly
• Deepfake detection is challenging
• Human authentication more important than ever!
26
![Page 27: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/27.jpg)
Automated hacking and patching
27
Cyber Grand Challenge
![Page 28: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/28.jpg)
AI as an attack vector
28Photo by Simon Zhu on Unsplash
![Page 29: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/29.jpg)
AI as an attack vector (poisoning)
29
![Page 30: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/30.jpg)
AI as an attack vector
30
Photo by Michael Sum on Unsplash
CAT
Photo by Berkay Gumustekin on Unsplash
Dog
![Page 31: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/31.jpg)
AI as an attack vector
31
Photo by Michael Sum on Unsplash
CAT
Photo by Michael Sum on Unsplash
DOG
Details: Explaining and harnessing adversarial examples (Goodfellow et al 2015)
Add specific noise
![Page 32: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/32.jpg)
AI as an attack vector – options
• Evade AI detection
• Skew training models (poisoning)
• Steal models
• AI software vulnerabilities
32
![Page 33: Artificial Intelligence in Cyber Security · Neural networks Natural Language Processing Reinforcement learning Techniques for narrow AI (AI Bingo!) Machine learning 8 ... Social](https://reader036.vdocuments.mx/reader036/viewer/2022071004/5fc0bbbda593f408e45a9091/html5/thumbnails/33.jpg)
Key take aways
Titel | Datum33
•AI supplements and strengthens existing measures and
provides new opportunities for automation
•AI brings advantages for attack and defense
•AI isn’t a panacea or a Pandora’s box
Photo by Lodewijk Hertog on Unsplash