From the course: Artificial Intelligence for Cybersecurity

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Security anomaly detection

Security anomaly detection

- [Instructor] So what if you don't have label data, or it's too cumbersome or expensive to apply labels to existing data? Well, it turns out that you can still draw useful insights from your data. For example, you want to find patterns in incoming internet traffic to your web server and hopefully, distinguish users from bots. Of course, you don't have label data to train the model, so you build an unsupervised learning model and let it analyze the logs and find interesting patterns of activities that can be useful to you. Such problems fall into the category of so-called clustering problems. Now, why clustering? Because the clustering algorithms group or cluster data with similar characteristics together. But wait, isn't a classification problem same as a clustering problem? Don't they both segregate data into groups? Well, no. In classification, categories are previously known, such as fraud versus genuine, and…

Contents