40
Artificial Intelligence

OWASP-AI Cambridge 180118

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: OWASP-AI Cambridge 180118

Artificial Intelligence

Page 2: OWASP-AI Cambridge 180118

AI Past and Future AI Enabled Cyber-security

ResearchFutureQ&A

Page 3: OWASP-AI Cambridge 180118

Deepinder Chhabra

Principal Consultant VerizonVice President (ISACA London Chapter)Professional Doctorate Student (UEL)

Post Graduate Diploma in ManagementExecutive Education from Harvard Business School

PRINCE2, TOGAF, ITIL FoundationCEH, CHFI, CGEIT, CISM, CRISC

Senior leadership roles in FTSE 500 companiesFinance, Services, Retail, Manufacturing, Defence and HMG experience.

[email protected]

The views presented here are solely my own personal views and not those of my employer (Verizon)

Experienced and trusted advisor in Governance, Risk, compliance and Cyber Security

Page 4: OWASP-AI Cambridge 180118

4

Page 5: OWASP-AI Cambridge 180118

5

Understanding /Knowledge/Intelligence

Page 6: OWASP-AI Cambridge 180118

6

AI - Computer systems able to perform tasks normally requiring human intelligence

Page 7: OWASP-AI Cambridge 180118

7

Page 8: OWASP-AI Cambridge 180118

8

Current Applications of AI

2005

2008

2002

2011

1997

2017

Page 9: OWASP-AI Cambridge 180118

9

Page 10: OWASP-AI Cambridge 180118

10

Page 11: OWASP-AI Cambridge 180118

Drivers for AI Enabled Cyber Security

Page 12: OWASP-AI Cambridge 180118

12

Page 13: OWASP-AI Cambridge 180118

13

Source: ISACA State of Security 2017

Page 14: OWASP-AI Cambridge 180118

14

Source: ISACA State of Security 2017

Page 15: OWASP-AI Cambridge 180118

15Source: ISACA State of Security 2017

Page 16: OWASP-AI Cambridge 180118

16

Source: ISACA State of Security 2017

Page 17: OWASP-AI Cambridge 180118

17

Page 18: OWASP-AI Cambridge 180118

18

Page 19: OWASP-AI Cambridge 180118

19

Page 20: OWASP-AI Cambridge 180118

Current Landscape

Page 21: OWASP-AI Cambridge 180118

21

https://youtu.be/b6Hf1O_vpwQ

Page 22: OWASP-AI Cambridge 180118

22

https://youtu.be/b6Hf1O_vpwQ

Page 23: OWASP-AI Cambridge 180118
Page 24: OWASP-AI Cambridge 180118

Source: http://testingbenfordslaw.com/population-of-turkish-boroughs

Page 25: OWASP-AI Cambridge 180118

Source: http://testingbenfordslaw.com/population-of-turkish-boroughs

Page 26: OWASP-AI Cambridge 180118

Source: http://testingbenfordslaw.com/population-of-turkish-boroughs

Page 27: OWASP-AI Cambridge 180118

27

Colgate launches AI in app-enabled electric toothbrush

Page 28: OWASP-AI Cambridge 180118

28

Page 29: OWASP-AI Cambridge 180118

29

Page 30: OWASP-AI Cambridge 180118

30

Page 31: OWASP-AI Cambridge 180118

31

Page 32: OWASP-AI Cambridge 180118

Research in Cyber Security

Page 33: OWASP-AI Cambridge 180118

33

Page 34: OWASP-AI Cambridge 180118

34

Page 35: OWASP-AI Cambridge 180118

35

Page 36: OWASP-AI Cambridge 180118

36

3 Papers were tested with the KDD99 data

MARKELM based model considered the well-published drawbacks and still achieved DR of 99.77% with KDD99 (FOSSACECA et al., 2015)

The model based on SVM and GMM with moving window; tested on real-life data from webservers and honey net is promising, but wider application

to Mac and Windows OS is untested (MAMALAKIS et al., 2014).

Another SVM and Gaussian kernel based model Intrusion detection and prevention model have been only tested within Smart Grid context

(PATEL et al., 2017).

Page 37: OWASP-AI Cambridge 180118

37

Page 38: OWASP-AI Cambridge 180118

38

Combination of big data analysis with software security technologies such as feature extraction, machine learning, binary instrumentation and

dynamic instruction flow analysis to achieve automated classification of malware algorithms. (Zhao et al.)

Combining intelligent cyber sensor agents which will detect, evaluate and respond to cyber-attacks in a timely manner and allow the groups of

agents to make decisions.(Akila et al.)

The two-tier model : dimension reduction and feature selection; good detection rate against rare and complex attack

(Pajouh et al.)

Page 39: OWASP-AI Cambridge 180118

39

Page 40: OWASP-AI Cambridge 180118

Thank You!