SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Machine Learning in Cyber Security
Rishi Kant Cyber Security Professional, www.rishikant.in
Machine Learning
What Is It? Why now?
Why is it useful?
Machine
Learning
Artificial
Intelligence
Data
Mining
Statistics
• Machine Learning is an application of
Artificial Intelligence (AI) that allows
computers to learn without being
explicitly programmed to do so.
• Machine learning is the modern
science of finding patterns and
making predictions from data based
on work in multivariate statistics, data
mining, pattern recognition and
advanced/ predictive analytics.
Ex: when detecting fraud in the millisecond it takes to swipe a
credit card, machine learning rules not only on information
associated with the transaction, such as value and location, but
also by leveraging historical and social network data for accurate
evaluation of potential fraud
• Manage your team instead of the data.
Innovation
• Discover hidden patterns
• Adaptability
• Predictive analysis
• With falling profit margins, increasing
End Users expectations and
increasing competition from
competitors which need to cut costs
and improve their offering.
• The ability to extract value from such
vast amounts of data has never been
cheaper or more effective.
Machine Learning: How does it learn?
Machine Learning algorithms are categorised as being supervised or unsupervised. The former can apply what has been learned in the past to new data.
The latter can draw inferences from datasets.
Feedback
Training Data
Collect and prepare relevant data to support
analysis. If the learning objective includes
“expert” judgment, also collect the historical
“right answers.”
Algorithms
Algorithms learn to recognise patterns in training
data. Teach the programme how to know when it
is doing well or poorly, and how to self-correct in
the future.
Trained Machine
Machine is now trained and ready to spot
patterns in real world examples in order to
drive business value
Supervised Learning
What? Output variable specified. Algorithm learns mapping
function from input to output
Why? To make predictions
Example: Predicting credit default risk
Unsupervised Learning
What? Output variable unspecified so algorithm looks for
structure in data
Why? To describe hidden distribution or structure of data
Example: Customer segmentation and product targeting
Determine Objective
Decide what you would like the machine
to handle that has previously been done
based on expert knowledge or intuition.
OR
Machine Learning in Different Sector
TRAVEL & HOSPITALITY
•Aircraft scheduling
•Dynamic pricing
•Social media-consumer feedback &
interaction analysis
•Customer complaint resolution Traffic
patterns & congestion management
FINANICAL SERVICES
•Risk analytics & regulation
•Customer segmentation
•Cross-selling & up-selling
•Sales & marketing campaign
management
•Credit worthiness evaluation
ENEGRY, FEEDSTOCK & UTILITIES
•Power usage analytics
•Seismic data processing
•Carbon emissions & trading
•Customer-specific pricing
•Smart grid management
•Energy demand & supply optimization
MANUFACTURING
•Predictive maintenance or condition
monitoring
•Warranty reserve estimation
•Propensity to buy
•Demand forecasting
•Process optimization
•Telematics
RETAIL
•Predictive inventory planning
•Recommendation engines
•Upsell and cross-channel market
segmentation & targeting
•Customer ROI & lifetime value
HEALTHCARE & LIFE SCIENCES
•Alerts & diagnostics from real-time
patient data
•Disease identification & risk
stratification
•Patient triage optimization
•Proactive health management
•Healthcare provider sentiment analysis
How Machine Learning benefits Cyber Security?
Traditionally Cyber Security
Deals problems were aided by Mathematical model.
e.g. – Data transformation[cryptography]
Modern Cyber Security
Deals with abstract threats which cannot be solved only by using mathematical models.
E.g. - Malware detection,
Intrusion detection,
Data leakage
SPAM mitigation
etc
Solution of Modern Cyber Security
How Machine Learning benefits Cyber Security?
* A Perfect example of Utilization of ML in Spam Filtering
Machine Learning Improved Some of the Areas
• Spam Mitigation
• Malware Detection
• Mitigation the Denial of Service Attacks
• Reputation in Cyber Space
• User Identification
• Detecting Identity Theft
• Information Leakage Detection & Prevention
• Social Network Security
• Detecting Advanced Persisted Threats
• Detecting Hidden Channels
Cyber Risk Analytics with Machine Learning
• Data Overload
• Disconnected & low quality data
• High false positive alerts
• Unknown unknowns- No Baseline
• Slow & manual Investigation processes
KEY CHALLENGES
• Focused Insight from Big Data
• Managing & rationalizing data
• Machine Learning identifies hidden patterns
• Diagnostics for understanding ‘normal’
• Targeted alerts based on anomalies
SOULTIONS
Threat Analytics
Areas
•Cyber Security refresh rate
•Custom payloads from
attackers
•Servers not the target
•Speed with volume
Why We need
Analytics ?
•Signature Based
•Anomaly Engines
•Analytics Workbench
•Learning Systems
Dissecting Detection
Systems •Credible / Clean training
data
•Positive & timely feedback
•Picking the right features
•Consistent feature variation
•Consistent data pattern
Benefits of ML
•DNS based detection
•DDos/ Traffic Anomaly
•SPAM Mail filters
•Authentication
•Application modelling
•Threat Intelligence
Improvement done by
ML
Threat Analytics
Learning Systems
Fraud Detection
With regulations evolving in response to the financial crisis, and technology developing at an exponential rate, Companies should invest
in the latest software to reduce their exposure to risk.
1
1
Method Human Involvement AccuracySpeed
Machine
Learning
Traditional
Detection
Machine Learning
Summary
 Lower fraud losses
 Lower operational
costs
 Improved customer
service
 Reduced
reputational risk
 Reduced regulatory
risk
• Algorithms analyse historical transaction data
for each customer to understand their individual
spending patterns. They can therefore spot
subtle anomalies that indicate fraud.
• Algorithms self-learn, meaning they quickly
adapt to new means of fraud, and can stay ahead
of fraudsters.
• Rely on pattern matching against recognised
past fraud types. Transactions then assessed
based on general rules, such as whether the
customer is buying abroad.
• Humans to identify trends and manually update
their models to account for changes in fraudulent
activity.
• Low
• Automatic -humans
to maintain the
algorithmic models.
• High
• Preventive over
corrective, meaning
higher rates of fraud
detection and fewer
false alarms.
• High
• Real-time, automatic
reviews of
transactions using
vast amounts of data
from multiple
sources.
• High
• Requires significant
manual analysis and
review, with regular
updates to fraud
systems.
• Medium
• Often corrective over
preventive with
limited use of data,
meaning lower
detection success
rates.
• Medium
• More human
involvement, often
using audit trails to
identify fraud.
• Less computing
power.
Credit Card Fraud Detection Scenario
Improvement of Security Incident
Internet-Scale measurement &
data collection (external)
• Malicious Activities: spam, phishing, scanning
• Network Mismanagement e.g. untrusted HTTPS
• Security Incident Reports: Victims VS Non-Victims
Data processing & feature
extraction
• Alignment in time & space
• Aggregate at the org. level
• 258 features, raw data & 1st/2nd order stats
Advanced data mining &
machine learning
• Classifier training
• Correlational Analysis
Prediction : the likelihood
of a future incident & type
of incident
Understanding causality
among features, security
inter-dependence
Incentive mechanism
design
Intrusion Detection
Analysis of
data
Extraction of
features
Selection of
unique
features
Creating
useful
datasets
Selecting &
classifying
features
Judgement Based
IT Sector evolving meaning they have a web of overly complex procedures built on multiple legacy platforms. Developments in
Robotics and Machine Learning mean automation of these processes is now more feasible and powerful than ever.
BusinessImpact
Nature Of Work
Rules Based
TransformationalTactical
Foundation
Simple, ad-hoc, project level
automation that can undertake
simple rule-based actions of a
single task within an application
when prompted (e.g. macros).
Robotic Process Automation
Also rule-based, but robots can
respond to external stimuli and have
their functions reprogrammed. They
can open and move structured data
between multiple applications, from
legacy systems to third party APIs
(application program interfaces).
Cognitive Automation
Self-learning, autonomous systems
driven by Machine Learning and
Natural Language Processing (NLP)
that can read and understand
unstructured information and
instruct a computer to act.
Understanding the Automation Landscape
Cognitive Automation
Cognitive automation has the power to automate many Business processes, in particular risk and regulatory reporting.
Cognitive Automation In Action – Document Processing Example
1 42 3 5
Open Email Classify according to
type
Comprehend & extract
relevant information
Validate information
against rules
Populate data into
Enterprise Resource
Planning system
Machine Learning
& NLP
Machine Learning
& NLP
Robotics
Machine Learning
& NLP
Robotics
Process&Technology
• Robotics can be thought of as the ‘hand’ work and cognitive the ‘head’ work – together they form a powerful alliance and can automate even
those processes that involve comprehending unstructured text or recognising voices, and making subjective decisions
• Benefits of cognitive automation include:
 Reduce headcount and associated operational costs
 Decreased cycle times for processes that can operate 24 hours per day (e.g. risk/regulatory reporting)
 Improved accuracy – reduction of human error
Cognitive Automation
The following purpose, process and location checklist can be used to help you understand whether Machine Learning can be
successfully applied to a process.
Location: Front, Middle &
Back Office
Purpose: Prediction?
Purpose: Segmentation?
Process: Big Data?
Process: Digital?
Process: Repetitive &
Judgement Based?
Checklist Why?
Supervised learning: Algorithms spot trends in historical data and use this to make
predictions based on new data.
Unsupervised learning: Machine Learning can spot differences and similarities not visible
to the human eye between each data point and make sensible groupings based on these
characteristics.
Processes that involve the use of paper and physical contact between people are not
applicable to Machine Learning.
Algorithms thrive off large datasets, offering better results. They also have the computing
power to analyse big data at speed.
Algorithms learn and improve from each repetition, and the automation of such
processes offers huge cost saving potential.
The advent of tools such as Natural Language Processing and Speech Recognition mean
that Machine Learning can be applied to processes with and without customer/client
interaction.
Cognitive Automation: Process Checklist
Overall Solution for Cybersecurity
Governance &
Compliance
Security
Management
Resiliency
Management
Training
Incident
Response &
Cyber Forensic
Security Posture
Assessment
Strategy &
Assessment
Planning &
Design
Implementation
& Deployment
Monitoring &
Management
Optimization &
Transformation
CSF

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain BGA Cyber Security
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityPriyanshu Ratnakar
 
introduction to machin learning
introduction to machin learningintroduction to machin learning
introduction to machin learningnilimapatel6
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Machine Learning
Machine LearningMachine Learning
Machine LearningRahul Kumar
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemAvinash Kumar
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
 

Was ist angesagt? (20)

Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Machine Can Think
Machine Can ThinkMachine Can Think
Machine Can Think
 
introduction to machin learning
introduction to machin learningintroduction to machin learning
introduction to machin learning
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Machine learning
Machine learning Machine learning
Machine learning
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 

Ähnlich wie ML Cyber Security: How AI Detects Fraud & Improves Threat Detection

What is Machine Learning.pptx
What is Machine Learning.pptxWhat is Machine Learning.pptx
What is Machine Learning.pptxkprasad8
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)AnandSRao1962
 
Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise deteo
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxyatintaneja6
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksDatabricks
 
AI and the Financial Service Segment
AI and the Financial Service SegmentAI and the Financial Service Segment
AI and the Financial Service SegmentGraeme Wood
 
Artificial Intelligence Primer
Artificial Intelligence PrimerArtificial Intelligence Primer
Artificial Intelligence PrimerImam Hoque
 
AI/ML Week: Support Fraud Analytics & Risk Management
AI/ML Week: Support Fraud Analytics & Risk ManagementAI/ML Week: Support Fraud Analytics & Risk Management
AI/ML Week: Support Fraud Analytics & Risk ManagementAmazon Web Services
 
Machine Learning in Customer Analytics
Machine Learning in Customer AnalyticsMachine Learning in Customer Analytics
Machine Learning in Customer AnalyticsCourse5i
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Cloudera, Inc.
 
Novel analytics for gas stations
Novel analytics for gas stationsNovel analytics for gas stations
Novel analytics for gas stationsNovelAnalytics
 
CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseAlessa
 
Barga Galvanize Sept 2015
Barga Galvanize Sept 2015Barga Galvanize Sept 2015
Barga Galvanize Sept 2015Roger Barga
 
Machine learning ppt
Machine learning ppt Machine learning ppt
Machine learning ppt Poojamanic
 
Prism presentation
Prism presentationPrism presentation
Prism presentationLakshmi .
 
Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24Chanchal Chatterjee
 
Machine Learning in Banking
Machine Learning in BankingMachine Learning in Banking
Machine Learning in Bankingaccenture
 

Ähnlich wie ML Cyber Security: How AI Detects Fraud & Improves Threat Detection (20)

What is Machine Learning.pptx
What is Machine Learning.pptxWhat is Machine Learning.pptx
What is Machine Learning.pptx
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)
 
Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In Databricks
 
Data mining
Data miningData mining
Data mining
 
AI and the Financial Service Segment
AI and the Financial Service SegmentAI and the Financial Service Segment
AI and the Financial Service Segment
 
Artificial Intelligence Primer
Artificial Intelligence PrimerArtificial Intelligence Primer
Artificial Intelligence Primer
 
AI/ML Week: Support Fraud Analytics & Risk Management
AI/ML Week: Support Fraud Analytics & Risk ManagementAI/ML Week: Support Fraud Analytics & Risk Management
AI/ML Week: Support Fraud Analytics & Risk Management
 
Fraud detection analysis
Fraud detection analysis Fraud detection analysis
Fraud detection analysis
 
Machine Learning in Customer Analytics
Machine Learning in Customer AnalyticsMachine Learning in Customer Analytics
Machine Learning in Customer Analytics
 
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning
Transforming Insurance Analytics with Big Data and Automated Machine Learning

Transforming Insurance Analytics with Big Data and Automated Machine Learning

 
Novel analytics for gas stations
Novel analytics for gas stationsNovel analytics for gas stations
Novel analytics for gas stations
 
CaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 ReleaseCaseWare Monitor - New in 5.4 Release
CaseWare Monitor - New in 5.4 Release
 
Barga Galvanize Sept 2015
Barga Galvanize Sept 2015Barga Galvanize Sept 2015
Barga Galvanize Sept 2015
 
Machine learning ppt
Machine learning ppt Machine learning ppt
Machine learning ppt
 
Deep learning
Deep learningDeep learning
Deep learning
 
Prism presentation
Prism presentationPrism presentation
Prism presentation
 
Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24
 
Machine Learning in Banking
Machine Learning in BankingMachine Learning in Banking
Machine Learning in Banking
 

Mehr von Rishi Kant

Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleRishi Kant
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityRishi Kant
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management Rishi Kant
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilienceRishi Kant
 

Mehr von Rishi Kant (6)

Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber security
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Clickjacking
ClickjackingClickjacking
Clickjacking
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

ML Cyber Security: How AI Detects Fraud & Improves Threat Detection

  • 1. Machine Learning in Cyber Security Rishi Kant Cyber Security Professional, www.rishikant.in
  • 2. Machine Learning What Is It? Why now? Why is it useful? Machine Learning Artificial Intelligence Data Mining Statistics • Machine Learning is an application of Artificial Intelligence (AI) that allows computers to learn without being explicitly programmed to do so. • Machine learning is the modern science of finding patterns and making predictions from data based on work in multivariate statistics, data mining, pattern recognition and advanced/ predictive analytics. Ex: when detecting fraud in the millisecond it takes to swipe a credit card, machine learning rules not only on information associated with the transaction, such as value and location, but also by leveraging historical and social network data for accurate evaluation of potential fraud • Manage your team instead of the data. Innovation • Discover hidden patterns • Adaptability • Predictive analysis • With falling profit margins, increasing End Users expectations and increasing competition from competitors which need to cut costs and improve their offering. • The ability to extract value from such vast amounts of data has never been cheaper or more effective.
  • 3. Machine Learning: How does it learn? Machine Learning algorithms are categorised as being supervised or unsupervised. The former can apply what has been learned in the past to new data. The latter can draw inferences from datasets. Feedback Training Data Collect and prepare relevant data to support analysis. If the learning objective includes “expert” judgment, also collect the historical “right answers.” Algorithms Algorithms learn to recognise patterns in training data. Teach the programme how to know when it is doing well or poorly, and how to self-correct in the future. Trained Machine Machine is now trained and ready to spot patterns in real world examples in order to drive business value Supervised Learning What? Output variable specified. Algorithm learns mapping function from input to output Why? To make predictions Example: Predicting credit default risk Unsupervised Learning What? Output variable unspecified so algorithm looks for structure in data Why? To describe hidden distribution or structure of data Example: Customer segmentation and product targeting Determine Objective Decide what you would like the machine to handle that has previously been done based on expert knowledge or intuition. OR
  • 4. Machine Learning in Different Sector TRAVEL & HOSPITALITY •Aircraft scheduling •Dynamic pricing •Social media-consumer feedback & interaction analysis •Customer complaint resolution Traffic patterns & congestion management FINANICAL SERVICES •Risk analytics & regulation •Customer segmentation •Cross-selling & up-selling •Sales & marketing campaign management •Credit worthiness evaluation ENEGRY, FEEDSTOCK & UTILITIES •Power usage analytics •Seismic data processing •Carbon emissions & trading •Customer-specific pricing •Smart grid management •Energy demand & supply optimization MANUFACTURING •Predictive maintenance or condition monitoring •Warranty reserve estimation •Propensity to buy •Demand forecasting •Process optimization •Telematics RETAIL •Predictive inventory planning •Recommendation engines •Upsell and cross-channel market segmentation & targeting •Customer ROI & lifetime value HEALTHCARE & LIFE SCIENCES •Alerts & diagnostics from real-time patient data •Disease identification & risk stratification •Patient triage optimization •Proactive health management •Healthcare provider sentiment analysis
  • 5. How Machine Learning benefits Cyber Security? Traditionally Cyber Security Deals problems were aided by Mathematical model. e.g. – Data transformation[cryptography] Modern Cyber Security Deals with abstract threats which cannot be solved only by using mathematical models. E.g. - Malware detection, Intrusion detection, Data leakage SPAM mitigation etc Solution of Modern Cyber Security
  • 6. How Machine Learning benefits Cyber Security? * A Perfect example of Utilization of ML in Spam Filtering
  • 7. Machine Learning Improved Some of the Areas • Spam Mitigation • Malware Detection • Mitigation the Denial of Service Attacks • Reputation in Cyber Space • User Identification • Detecting Identity Theft • Information Leakage Detection & Prevention • Social Network Security • Detecting Advanced Persisted Threats • Detecting Hidden Channels
  • 8. Cyber Risk Analytics with Machine Learning • Data Overload • Disconnected & low quality data • High false positive alerts • Unknown unknowns- No Baseline • Slow & manual Investigation processes KEY CHALLENGES • Focused Insight from Big Data • Managing & rationalizing data • Machine Learning identifies hidden patterns • Diagnostics for understanding ‘normal’ • Targeted alerts based on anomalies SOULTIONS
  • 9. Threat Analytics Areas •Cyber Security refresh rate •Custom payloads from attackers •Servers not the target •Speed with volume Why We need Analytics ? •Signature Based •Anomaly Engines •Analytics Workbench •Learning Systems Dissecting Detection Systems •Credible / Clean training data •Positive & timely feedback •Picking the right features •Consistent feature variation •Consistent data pattern Benefits of ML •DNS based detection •DDos/ Traffic Anomaly •SPAM Mail filters •Authentication •Application modelling •Threat Intelligence Improvement done by ML
  • 11. Fraud Detection With regulations evolving in response to the financial crisis, and technology developing at an exponential rate, Companies should invest in the latest software to reduce their exposure to risk. 1 1 Method Human Involvement AccuracySpeed Machine Learning Traditional Detection Machine Learning Summary  Lower fraud losses  Lower operational costs  Improved customer service  Reduced reputational risk  Reduced regulatory risk • Algorithms analyse historical transaction data for each customer to understand their individual spending patterns. They can therefore spot subtle anomalies that indicate fraud. • Algorithms self-learn, meaning they quickly adapt to new means of fraud, and can stay ahead of fraudsters. • Rely on pattern matching against recognised past fraud types. Transactions then assessed based on general rules, such as whether the customer is buying abroad. • Humans to identify trends and manually update their models to account for changes in fraudulent activity. • Low • Automatic -humans to maintain the algorithmic models. • High • Preventive over corrective, meaning higher rates of fraud detection and fewer false alarms. • High • Real-time, automatic reviews of transactions using vast amounts of data from multiple sources. • High • Requires significant manual analysis and review, with regular updates to fraud systems. • Medium • Often corrective over preventive with limited use of data, meaning lower detection success rates. • Medium • More human involvement, often using audit trails to identify fraud. • Less computing power. Credit Card Fraud Detection Scenario
  • 12. Improvement of Security Incident Internet-Scale measurement & data collection (external) • Malicious Activities: spam, phishing, scanning • Network Mismanagement e.g. untrusted HTTPS • Security Incident Reports: Victims VS Non-Victims Data processing & feature extraction • Alignment in time & space • Aggregate at the org. level • 258 features, raw data & 1st/2nd order stats Advanced data mining & machine learning • Classifier training • Correlational Analysis Prediction : the likelihood of a future incident & type of incident Understanding causality among features, security inter-dependence Incentive mechanism design
  • 13. Intrusion Detection Analysis of data Extraction of features Selection of unique features Creating useful datasets Selecting & classifying features
  • 14. Judgement Based IT Sector evolving meaning they have a web of overly complex procedures built on multiple legacy platforms. Developments in Robotics and Machine Learning mean automation of these processes is now more feasible and powerful than ever. BusinessImpact Nature Of Work Rules Based TransformationalTactical Foundation Simple, ad-hoc, project level automation that can undertake simple rule-based actions of a single task within an application when prompted (e.g. macros). Robotic Process Automation Also rule-based, but robots can respond to external stimuli and have their functions reprogrammed. They can open and move structured data between multiple applications, from legacy systems to third party APIs (application program interfaces). Cognitive Automation Self-learning, autonomous systems driven by Machine Learning and Natural Language Processing (NLP) that can read and understand unstructured information and instruct a computer to act. Understanding the Automation Landscape Cognitive Automation
  • 15. Cognitive automation has the power to automate many Business processes, in particular risk and regulatory reporting. Cognitive Automation In Action – Document Processing Example 1 42 3 5 Open Email Classify according to type Comprehend & extract relevant information Validate information against rules Populate data into Enterprise Resource Planning system Machine Learning & NLP Machine Learning & NLP Robotics Machine Learning & NLP Robotics Process&Technology • Robotics can be thought of as the ‘hand’ work and cognitive the ‘head’ work – together they form a powerful alliance and can automate even those processes that involve comprehending unstructured text or recognising voices, and making subjective decisions • Benefits of cognitive automation include:  Reduce headcount and associated operational costs  Decreased cycle times for processes that can operate 24 hours per day (e.g. risk/regulatory reporting)  Improved accuracy – reduction of human error Cognitive Automation
  • 16. The following purpose, process and location checklist can be used to help you understand whether Machine Learning can be successfully applied to a process. Location: Front, Middle & Back Office Purpose: Prediction? Purpose: Segmentation? Process: Big Data? Process: Digital? Process: Repetitive & Judgement Based? Checklist Why? Supervised learning: Algorithms spot trends in historical data and use this to make predictions based on new data. Unsupervised learning: Machine Learning can spot differences and similarities not visible to the human eye between each data point and make sensible groupings based on these characteristics. Processes that involve the use of paper and physical contact between people are not applicable to Machine Learning. Algorithms thrive off large datasets, offering better results. They also have the computing power to analyse big data at speed. Algorithms learn and improve from each repetition, and the automation of such processes offers huge cost saving potential. The advent of tools such as Natural Language Processing and Speech Recognition mean that Machine Learning can be applied to processes with and without customer/client interaction. Cognitive Automation: Process Checklist
  • 17. Overall Solution for Cybersecurity Governance & Compliance Security Management Resiliency Management Training Incident Response & Cyber Forensic Security Posture Assessment Strategy & Assessment Planning & Design Implementation & Deployment Monitoring & Management Optimization & Transformation CSF

Hinweis der Redaktion

  1. Manage your team instead of the data. Machine Learning is based on algorithms that can learn from data without relying on rules-based programming, and its main benefit is the ability to relentlessly analyze data and every combination of variables. Innovation: Machine Learning is designed to break benchmarks and reset the rules. Agents are not limited to the methods used the previous year, month, or day. Anything goes. Automatically discover hidden patterns and anomalies within data through a simple visual interface. Instead of reports comprised of static data, get actionable feedback. Adaptability is the foundation of Machine Learning. Challenges, target metrics and quizzes need to adapt to each individual agent’s pace. Without Machine Learning driving the system, progress is a one-size-fits-all proposition.  Machine Learning is the best model for combining hard science with human behavior. Predictive analysis provides insight into performance plateaus, engagement at work, and loyalty.
  2. A predictive analytics approach to forecasting cyber security incidents. We start from Internet-scale measurement on the security postures of network entities. We also collect security incident reports to use as labels in a supervised learning framework. The collected data then goes through extensive processing and domain-specific feature extraction. Features are then used to train a classifier that generates predictions when we input new features, on the likelihood of a future incident for the entity associated with the input features. We are also actively seeking to understand the causal relationship among different features and the security interdependence among different network entities. Lastly, risk prediction helps us design better incentive mechanisms which is another facet of our research in this domain.
  3. Analysis of data : Data traffic can be analyzed at the packet, connection or session level. The connection represents a bidirectional flow and the session represents multiple connections between the same source and destination. ‘Bro’ can monitor Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP), and write the analyzed traffic to well-structured, tab-separated files suitable for post-processing. The platform interprets UDP and ICMP connection using flow semantics. Extraction of features: Log file, for example, contains generic information about each connection, such as the time stamp, connection ID, source IP, source port, destination IP and destination port. This information is not enough. To extract more features from the network traffic, we need to create features and attributes to help us distinguish between normal and harmful traffic. Selection of unique features: To add more depth to the analysis, we should determine whether the payload contains: Shellcode, JavaScript code, SQL command or SQL injection queries, Command injection or others. Those features can help the machine detect zero-day and web application attacks. To extract all the features, I limit the extraction process to the data sent by the source of the connection. Most features can be extracted using a regular expression or calculated directly from the connection content. Shellcode is a notable exception, because attackers can encrypt, compress or encode it. To solve this problem, at the suggestion of Dr. Ali Hadi, I used malware analysis platform Cuckoo Sandbox. Hadi suggested extracting more features from the traffic, such as the sequence of application program interfaces (APIs). Creating useful datasets: Now that we Create a good data set with features to detect advanced attacks, we can use it to train the computer to classify new connections Selecting & classifying features: we selected various important and generic features out of wide to train the computer to recognize the attacks: Ex: Protocol; Service; Entropy; Number of nonprintable characters; Number of punctuation characters; Contains JavaScript; Contains SQL statement; Contains command injection; and Class. For the classification, we can use ’ Weka’, a collection of machine learning algorithms for data mining tasks.