0% found this document useful (0 votes)
2 views

Lecture02

The document provides an overview of machine learning, defining it as a process where computer programs improve their performance on tasks through experience. It discusses the challenges faced in machine learning, such as data quality and overfitting, and highlights various applications including security-related uses like malware detection and anomaly detection. Additionally, it contrasts supervised, unsupervised, and reinforcement learning, outlining their algorithms and examples.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Lecture02

The document provides an overview of machine learning, defining it as a process where computer programs improve their performance on tasks through experience. It discusses the challenges faced in machine learning, such as data quality and overfitting, and highlights various applications including security-related uses like malware detection and anomaly detection. Additionally, it contrasts supervised, unsupervised, and reinforcement learning, outlining their algorithms and examples.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Lecture

Machine Learning
02

Machine Learning Basics

Arslan Ali Khan


[email protected]
Department of Cyber-Security and Data Science
Riphah Institute of Systems Engineering (RISE),
Riphah International University, Islamabad, Pakistan.
Machine Learning 5

“A computer program is said to learn from experience E with respect to


some class of tasks T and performance measure P, if its performance at
tasks in T, as measured by P, improves with experience E.”

• Improve their performance P

• At executing some task T

• Over time with experience E


Machine Learning Problem 6

A Pattern Exists

We don’t know it

We have data to learn it

• Designing algorithms that ingest data and learn a (hypothesized) model of the data

• The learned model can be used to Detect patterns/structures/themes/trends etc. in the data

• Make predictions about future data and make decisions


Why Machine Learning? 7

• ML needed for:
 Data-Driven Decision Making
 Effic iency and Scale

• When to Make Machines Learn?


 Lack of human expertise
 Dynamic scenarios
 Difficulty in translating expertise into computational task
Challenges

• Quality of data
• Use of low-quality data leads to the problems related to data preprocessing and feature extraction.

• Time-Consuming task
• Consumption of time especially for data acquisition, feature extraction and retrieval.

• No clear objective for formulating business problems


• Having no clear objective and well-defined goal for business problems is another key challenge.

• Issue of overfitting & underfitting


• If the model is overfitting or underfitting, it cannot be represented well for the problem

• Curse of dimensionality
• Too many features of data points. This can be a real hindrance.

• Difficulty in deployment
• Complexity of the ML model makes it difficult to be deployed in real life.
Applications

• Emotion analysis
• Sentiment analysis
• Error detection and prevention
• Weather forecasting and prediction
• Stock market analysis and fore casting
• Spam Detection
• Speech recognition
• Customer segmentation
• Obje ct recognition
• Fraud detection
• Recommendation of products to c ustomer in online shopping.
Applications
Applications In Security

• Malware Detection and Classification


• DDOS/Phishing attack detection
• Cryptography and AI
• Network Traffic Analysis
• Insider Threat Detection
• Anomaly Detection
• Botnet and Spam Detection
• Digital Forensics
Trends in ML and CYS

• Responding to Ransomware
• Combining Application Development and Cybersecurity
• Detecting Non-Malware Threats
• Deep Reinforcement Learning
• Protecting the IoT
• Predicting the Future

DGA:Domain Generation Algorithm


Machine Learning Example
Machine Learning Example
Machine Learning Example
Machine Learning Example
Supervised Learning
Supervised Learning Algorithms

• Linear Regression

• Random Forest

• Support Vector Machine


Supervised Learning: Examples
Un-Supervised Learning
Unsupervised Learning Algorithms

• K-Means Algorithm

• Apriori Algorithm

• Hierarchical Clustering Algorithm


Attributes/Features/Columns/Dimensions
Object/ Record/ Tuple/Row
Un-Supervised Learning 23

Clustering

Anomaly Detection
Example- Unsupervised Learning

Social Network Analysis


Customer Segmentation
Reinforcement Learning
Reinforcement Learning…

Exploration

Exploitation
Exploration
Explorationis more of a long-termbenefitconcept whereit allows the agentto improveits knowledgeabout each action whichcould lead to long term
benefit.
Exploitation
Exploitation basically exploits the agent’s current estimatedvalue and chooses the greedy approach to get the most reward. However, the agent is
being greedy withthe estimatedvalue andnot the actual value, so chances are it might not get the mostreward.

https://ai-ml-analytics.com/reinforcement-learning-exploration-vs-exploitation-tradeoff/
Examples: Reinforcement Learning…

• Allocating scarce resources to handle ER cases

• Creating next best offer model for a call center

• Shelf Management
ML Versus DL

• Data Dependency
• Hardware Dependency
• Feature Engineering
• Problem Solving Approach
• Execution Time

You might also like