Role of machine learning in cyber security
https://images.app.goo.gl/HEkAH9CDg5u7jv3A7

Role of machine learning in cyber security

Why to read this?

Analysts at ABI Research estimate that machine learning in cybersecurity will boost spending in big data, artificial intelligence (AI) and analytics to $96 billion by 2021, while some of the world’s technology giants are already taking a stand to better protect their own customers.


Technical explanation

Machine learning has become a vital technology for cybersecurity. Machine learning preemptively stamps out cyber threats and bolsters security infrastructure through pattern detection, real-time cyber crime mapping and thorough penetration testing.

No alt text provided for this image



Applications


  • Close zero-day vulnerabilities 
  • detect malicious activity like ransomware and stop attacks
  • Automate repetitive security tasks
  • Empower BYOD mobile devices against security threats
No alt text provided for this image


Nature of domain
  • Real time analysis is needed many times. For example, zero day attack needs analysis of real time traffic 
  • Prediction of attacks based on temporal data (time series data) is important task.
No alt text provided for this image



ML helping hand in cybersecurity goals
No alt text provided for this image



ML tools

Anomaly detection models

Anomaly detection based ML models can help to detect intrusion and zero day attack. Refer here for the detail. Also, refer colab example for zero day attack demo.


Monto Carlo simulation

It assigns lower and upper limit for financial loss in case the threat occurs 

No alt text provided for this image


Refer colab for monto Carlo simulation example for ransomware attack loss.

Graph based security analysis

This is recent area. Refer here for the detail. This is another paper

No alt text provided for this image



DeepDefense

Refer this paper for the detail

No alt text provided for this image



Data collection points
  • Packet level data
  • Flow level data
  • Connection level data - For example, VPN session data
  • Host level data - For example Endpoint protection platforms (EPP) which resides in the BYOD devices

Refer here for detail of interesting security parameters 



IS MACHINE LEARNING ENOUGH TO STOP CYBERCRIME?


It's a tool in the toolkit. Over-reliance on AI in cybersecurity can create a false sense of safety. That's why, in addition to judiciously applied algorithms, cybersecurity experts, data scientists and psychologists are crucial


Reference
Thanks to these helping hands
https://www.mdsny.com/5-top-machine-learning-use-cases-for-security/

https://builtin.com/artificial-intelligence/machine-learning-cybersecurity

https://images.app.goo.gl/dmXX7emTrFTD4pip6

https://images.app.goo.gl/HEkAH9CDg5u7jv3A7

https://images.app.goo.gl/ZrpRGCueCB2DZrCN8

https://www.garudax.id/posts/dpkumar_anomalydetection-cybersecurity-machinelearningmodels-activity-6767977267718184960-5xbh

https://images.app.goo.gl/NHvRv7cTmHbNk2HQ6

https://embracethered.com/blog/posts/2020/red-teaming-and-monte-carlo-simulations/

https://journalofbigdata.springeropen.com/articles/10.1186/s40537-020-00318-5

https://dzone.com/articles/positive-impact-of-graph-technology-and-neural-net

https://arxiv.org/pdf/1812.01661.pdf

https://www.semanticscholar.org/paper/DeepDefense%3A-Identifying-DDoS-Attack-via-Deep-Yuan-Li/2550d4f922f9652c4755695c822e492161524bce

https://colab.research.google.com/drive/1D4z6kRAnSqJ4X21kMxMF2QWlpylmDmVQ?usp=sharing

https://colab.research.google.com/drive/1D4z6kRAnSqJ4X21kMxMF2QWlpylmDmVQ?usp=sharing


Thanks Srinivasa Rao Pelluri for suggestion to write on this topic

Like
Reply

To view or add a comment, sign in

More articles by Deepak Kumar

Others also viewed

Explore content categories