SlideShare a Scribd company logo
Understanding the "Intelligence" in AI
RAFFAEL MARTY
VP Research and Intelligence
Head of X-Labs, Forcepoint
AI 4 Cyber | April 2019 | New York City
A BRIEF SUMMARY
We don’t have artificial intelligence (yet)
Algorithms can be dangerous - Understand your data and your
algorithms
Build systems that capture “expert knowledge” and augment human
capabilities
Escape the cat and mouse game between attackers and security
Copyright © 2019 Raffael Marty. | 2
RAFFAEL MARTY
Sophos
PixlCloud
Loggly
Splunk
ArcSight
IBM Research
Security Visualization
Big Data
ML & AI
SIEM
Corp Strategy
Leadership
Zen
Copyright © 2019 Raffael Marty | 3
BEAT WORLD
CHAMPION AT GO
DESIGN MORE
EFFECTIVE DRUGS
MAKE SIRI
SMARTER
ARTIFICIAL INTELLIGENCE
Deep
Learning
Statistics
Unsupervised
Machine
Learning
Natural
Language
Processing
THE DANGERS OF AI SECURITY EXAMPLES
Fooling Facial Recognition
Hack Crash Tweet
Blacklisting of
Windows Executable
Pentagon AI Fail
Algorithm Bias
NOTIFY_SOCKET=/run/syst
emd/notify systemd-notify ""
Data Biases
WHAT MAKES ALGORITHMS DANGEROUS?
Algorithms make assumptions about the data.
Algorithms are too easy to use.
Algorithms do not take domain knowledge into account.
History is not a predictor of the future.
Copyright © 2019 Raffael Marty. | 6
UNDERSTAND YOUR DATA
dest port!
Port 70000?
src ports!
http://vis.pku.edu.cn/people/simingchen/docs/vastchallenge13-mc3.pdf
CHOOSING THE CORRECT ALGORITHM PARAMETERS
The dangers of not understanding algorithmic parameters
t-SNE clustering of network traffic from two types of machines
perplexity = 3
epsilon = 3
No clear separation
perplexity = 3
epsilon = 19
3 clusters instead of 2
perplexity = 93
epsilon = 19
What a mess
Copyright © 2019 Raffael Marty. | 8
INTELLIGENCE Expert KnowledgeSecurity Graph
DETECTION COMPONENTS
RISK-ADAPTIVE PROTECTION
ADDING THE INTELLIGENCE INTO AI
CYBER BEHAVIOR CATALOG
IOCs to
Behaviors
IOCs / Traditional Threat Intel Behavior
ESCAPING THE SECURITY CAT AND MOUSE GAME
CnC
Bot
Bot
IOC: Compromised IP addresses
• Characterizing machine and human behavior
• Leverage risk-based approaches
• From reactive to proactive
• From detection to protection / automation
Behavior: Botnet characteristics
Traffic size: 200-350bytes
Periodicity: 2 minutes
Jitter: 12 seconds
IPv4 proto: 6
App protocol: HTTPS
TAKEAWAYS
“Algorithms are getting ‘smarter’,
but experts are more important”
“Understand your data, your algorithms,
and your data science process”
“History is not a predictor
– but knowledge can be”
http://slideshare.net/zrlram
@raffaelmarty
QUESTIONS?
Copyright © 2019 Raffael Marty. | 15

More Related Content

What's hot (20)

PDF
How Machine Learning & AI Will Improve Cyber Security
DevOps.com
 
PPTX
AI In Cybersecurity – Challenges and Solutions
ZoneFox
 
PDF
Challenges in Applying AI to Enterprise Cybersecurity
Tahseen Shabab
 
PPTX
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
Forcepoint LLC
 
PPTX
AI and ML in Cybersecurity
Forcepoint LLC
 
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
 
PPTX
Actionable Threat Intelligence
OWASP Delhi
 
PDF
Cybersecurity with AI - Ashrith Barthur
Sri Ambati
 
PPTX
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
 
PDF
Visualizing Threats: Network Visualization for Cyber Security
Cambridge Intelligence
 
PDF
Threat Intelligence Workshop
Priyanka Aash
 
PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
Raffael Marty
 
PPTX
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
 
PDF
AI and Cybersecurity - Food for Thought
NUS-ISS
 
PDF
The good, the bad, and the ugly on integration ai with cybersecurity
Mohammad Khreesha
 
PPTX
Threat intelligence in security
Osama Ellahi
 
PDF
Threat Intelligence
Deepak Kumar (D3)
 
PDF
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
PDF
Sans cyber-threat-intelligence-survey-2015
Roy Ramkrishna
 
PPTX
AI and the Impact on Cybersecurity
Graham Mann
 
How Machine Learning & AI Will Improve Cyber Security
DevOps.com
 
AI In Cybersecurity – Challenges and Solutions
ZoneFox
 
Challenges in Applying AI to Enterprise Cybersecurity
Tahseen Shabab
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
Forcepoint LLC
 
AI and ML in Cybersecurity
Forcepoint LLC
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
 
Actionable Threat Intelligence
OWASP Delhi
 
Cybersecurity with AI - Ashrith Barthur
Sri Ambati
 
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
 
Visualizing Threats: Network Visualization for Cyber Security
Cambridge Intelligence
 
Threat Intelligence Workshop
Priyanka Aash
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
Raffael Marty
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
 
AI and Cybersecurity - Food for Thought
NUS-ISS
 
The good, the bad, and the ugly on integration ai with cybersecurity
Mohammad Khreesha
 
Threat intelligence in security
Osama Ellahi
 
Threat Intelligence
Deepak Kumar (D3)
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
Sans cyber-threat-intelligence-survey-2015
Roy Ramkrishna
 
AI and the Impact on Cybersecurity
Graham Mann
 

Similar to Understanding the "Intelligence" in AI (20)

PDF
AI & ML in Cyber Security - Why Algorithms are Dangerous
Priyanka Aash
 
PDF
Artificial Intelligence Techniques for Cyber Security
IRJET Journal
 
PDF
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET Journal
 
PDF
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
 
PDF
CIS AIML Beginners Series Part 1
Council Of Information Security
 
PDF
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET Journal
 
PDF
Artificial Intelligence in cybersecurity
SmartlearningUK
 
PPTX
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
PDF
Cyber Defense Automation
♟Sergej Epp
 
PPTX
9.-Vectra._Managing-Cyber-Risk-by-applying-AI-to-automate-threat-hunting.pptx
PhmNam55
 
PDF
Top Positive and Negative Impacts of AI & ML on Cybersecurity
PixelCrayons
 
PDF
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
PDF
Security in the age of Artificial Intelligence
Faction XYZ
 
PDF
The Impact of Artificial Intelligence on Cybersecurity | Skillfloor
SKILLFLOOR
 
PDF
AI for Cybersecurity Innovation
Pete Burnap
 
PDF
PaloAlto Enterprise Security Solution
Prime Infoserv
 
PPTX
Need for Threat Intelligence & How to Operationalize it for your Organisation.
Aditya Mukherjee Information Security
 
PDF
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
JeremySnyder8
 
PPTX
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
PPTX
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
Priyanka Aash
 
Artificial Intelligence Techniques for Cyber Security
IRJET Journal
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET Journal
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
 
CIS AIML Beginners Series Part 1
Council Of Information Security
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET Journal
 
Artificial Intelligence in cybersecurity
SmartlearningUK
 
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
Cyber Defense Automation
♟Sergej Epp
 
9.-Vectra._Managing-Cyber-Risk-by-applying-AI-to-automate-threat-hunting.pptx
PhmNam55
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
PixelCrayons
 
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Security in the age of Artificial Intelligence
Faction XYZ
 
The Impact of Artificial Intelligence on Cybersecurity | Skillfloor
SKILLFLOOR
 
AI for Cybersecurity Innovation
Pete Burnap
 
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Need for Threat Intelligence & How to Operationalize it for your Organisation.
Aditya Mukherjee Information Security
 
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
JeremySnyder8
 
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Ad

More from Raffael Marty (20)

PDF
Exploring the Defender's Advantage
Raffael Marty
 
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Raffael Marty
 
PPTX
How To Drive Value with Security Data
Raffael Marty
 
PDF
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
 
PDF
Security Insights at Scale
Raffael Marty
 
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
PDF
Visualization in the Age of Big Data
Raffael Marty
 
PDF
Big Data Visualization
Raffael Marty
 
PDF
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
PDF
Workshop: Big Data Visualization for Security
Raffael Marty
 
PDF
Visualization for Security
Raffael Marty
 
PDF
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
PDF
DAVIX - Data Analysis and Visualization Linux
Raffael Marty
 
PDF
Cloud - Security - Big Data
Raffael Marty
 
PDF
Cyber Security – How Visual Analytics Unlock Insight
Raffael Marty
 
PDF
AfterGlow
Raffael Marty
 
PDF
Supercharging Visualization with Data Mining
Raffael Marty
 
PDF
Security Visualization - Let's Take A Step Back
Raffael Marty
 
PDF
Visual Analytics and Security Intelligence
Raffael Marty
 
Exploring the Defender's Advantage
Raffael Marty
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Raffael Marty
 
How To Drive Value with Security Data
Raffael Marty
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
 
Security Insights at Scale
Raffael Marty
 
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
Visualization in the Age of Big Data
Raffael Marty
 
Big Data Visualization
Raffael Marty
 
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
Workshop: Big Data Visualization for Security
Raffael Marty
 
Visualization for Security
Raffael Marty
 
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
DAVIX - Data Analysis and Visualization Linux
Raffael Marty
 
Cloud - Security - Big Data
Raffael Marty
 
Cyber Security – How Visual Analytics Unlock Insight
Raffael Marty
 
AfterGlow
Raffael Marty
 
Supercharging Visualization with Data Mining
Raffael Marty
 
Security Visualization - Let's Take A Step Back
Raffael Marty
 
Visual Analytics and Security Intelligence
Raffael Marty
 
Ad

Recently uploaded (20)

PPTX
Brain_stem_Medulla oblongata_functions of pons_mid brain
muralinath2
 
PPTX
Reticular formation_nuclei_afferent_efferent
muralinath2
 
PPTX
The Toxic Effects of Aflatoxin B1 and Aflatoxin M1 on Kidney through Regulati...
OttokomaBonny
 
PPTX
Nature of Science and the kinds of models used in science
JocelynEvascoRomanti
 
PDF
Systems Biology: Integrating Engineering with Biological Research (www.kiu.a...
publication11
 
PPTX
Home Garden as a Component of Agroforestry system : A survey-based Study
AkhangshaRoy
 
PPTX
Cell Structure and Organelles Slides PPT
JesusNeyra8
 
PDF
Renewable Energy Resources (Solar, Wind, Nuclear, Geothermal) Presentation
RimshaNaeem23
 
PPTX
MODIS/VIIRS Standard Cloud Products: SW Calibration and Trend Quantification ...
ShaneFernandes24
 
PPTX
Quality control test for plastic & metal.pptx
shrutipandit17
 
PDF
High-definition imaging of a filamentary connection between a close quasar pa...
Sérgio Sacani
 
PPT
1a. Basic Principles of Medical Microbiology Part 2 [Autosaved].ppt
separatedwalk
 
PPTX
Q1_Science 8_Week4-Day 5.pptx science re
AizaRazonado
 
PPTX
Feeding stratagey for climate change dairy animals.
Dr.Zulfy haq
 
PDF
Control and coordination Class 10 Chapter 6
LataHolkar
 
PPTX
RED ROT DISEASE OF SUGARCANE.pptx
BikramjitDeuri
 
PPTX
Laboratory design and safe microbiological practices
Akanksha Divkar
 
PPTX
Hydrocarbons Pollution. OIL pollutionpptx
AkCreation33
 
PDF
Quorum Sensing and Microbial Communication
Prachi Virat
 
PPTX
The Obesity Paradox. Friend or Foe ?pptx
drdgd1972
 
Brain_stem_Medulla oblongata_functions of pons_mid brain
muralinath2
 
Reticular formation_nuclei_afferent_efferent
muralinath2
 
The Toxic Effects of Aflatoxin B1 and Aflatoxin M1 on Kidney through Regulati...
OttokomaBonny
 
Nature of Science and the kinds of models used in science
JocelynEvascoRomanti
 
Systems Biology: Integrating Engineering with Biological Research (www.kiu.a...
publication11
 
Home Garden as a Component of Agroforestry system : A survey-based Study
AkhangshaRoy
 
Cell Structure and Organelles Slides PPT
JesusNeyra8
 
Renewable Energy Resources (Solar, Wind, Nuclear, Geothermal) Presentation
RimshaNaeem23
 
MODIS/VIIRS Standard Cloud Products: SW Calibration and Trend Quantification ...
ShaneFernandes24
 
Quality control test for plastic & metal.pptx
shrutipandit17
 
High-definition imaging of a filamentary connection between a close quasar pa...
Sérgio Sacani
 
1a. Basic Principles of Medical Microbiology Part 2 [Autosaved].ppt
separatedwalk
 
Q1_Science 8_Week4-Day 5.pptx science re
AizaRazonado
 
Feeding stratagey for climate change dairy animals.
Dr.Zulfy haq
 
Control and coordination Class 10 Chapter 6
LataHolkar
 
RED ROT DISEASE OF SUGARCANE.pptx
BikramjitDeuri
 
Laboratory design and safe microbiological practices
Akanksha Divkar
 
Hydrocarbons Pollution. OIL pollutionpptx
AkCreation33
 
Quorum Sensing and Microbial Communication
Prachi Virat
 
The Obesity Paradox. Friend or Foe ?pptx
drdgd1972
 

Understanding the "Intelligence" in AI

  • 1. Understanding the "Intelligence" in AI RAFFAEL MARTY VP Research and Intelligence Head of X-Labs, Forcepoint AI 4 Cyber | April 2019 | New York City
  • 2. A BRIEF SUMMARY We don’t have artificial intelligence (yet) Algorithms can be dangerous - Understand your data and your algorithms Build systems that capture “expert knowledge” and augment human capabilities Escape the cat and mouse game between attackers and security Copyright © 2019 Raffael Marty. | 2
  • 3. RAFFAEL MARTY Sophos PixlCloud Loggly Splunk ArcSight IBM Research Security Visualization Big Data ML & AI SIEM Corp Strategy Leadership Zen Copyright © 2019 Raffael Marty | 3
  • 4. BEAT WORLD CHAMPION AT GO DESIGN MORE EFFECTIVE DRUGS MAKE SIRI SMARTER ARTIFICIAL INTELLIGENCE Deep Learning Statistics Unsupervised Machine Learning Natural Language Processing
  • 5. THE DANGERS OF AI SECURITY EXAMPLES Fooling Facial Recognition Hack Crash Tweet Blacklisting of Windows Executable Pentagon AI Fail Algorithm Bias NOTIFY_SOCKET=/run/syst emd/notify systemd-notify "" Data Biases
  • 6. WHAT MAKES ALGORITHMS DANGEROUS? Algorithms make assumptions about the data. Algorithms are too easy to use. Algorithms do not take domain knowledge into account. History is not a predictor of the future. Copyright © 2019 Raffael Marty. | 6
  • 7. UNDERSTAND YOUR DATA dest port! Port 70000? src ports! http://vis.pku.edu.cn/people/simingchen/docs/vastchallenge13-mc3.pdf
  • 8. CHOOSING THE CORRECT ALGORITHM PARAMETERS The dangers of not understanding algorithmic parameters t-SNE clustering of network traffic from two types of machines perplexity = 3 epsilon = 3 No clear separation perplexity = 3 epsilon = 19 3 clusters instead of 2 perplexity = 93 epsilon = 19 What a mess Copyright © 2019 Raffael Marty. | 8
  • 9. INTELLIGENCE Expert KnowledgeSecurity Graph DETECTION COMPONENTS RISK-ADAPTIVE PROTECTION ADDING THE INTELLIGENCE INTO AI CYBER BEHAVIOR CATALOG
  • 10. IOCs to Behaviors IOCs / Traditional Threat Intel Behavior ESCAPING THE SECURITY CAT AND MOUSE GAME CnC Bot Bot IOC: Compromised IP addresses • Characterizing machine and human behavior • Leverage risk-based approaches • From reactive to proactive • From detection to protection / automation Behavior: Botnet characteristics Traffic size: 200-350bytes Periodicity: 2 minutes Jitter: 12 seconds IPv4 proto: 6 App protocol: HTTPS
  • 11. TAKEAWAYS “Algorithms are getting ‘smarter’, but experts are more important” “Understand your data, your algorithms, and your data science process” “History is not a predictor – but knowledge can be”