SlideShare a Scribd company logo
AI & ML in Cyber Security
Welcome Back To 1999 - Security Hasn’t Changed
Raffael Marty
VP Security Analytics
BSides Vancouver
March 2017
Disclaimer
© Raffael Marty 2
"This presentation was prepared solely by Raffael
Marty in his personal capacity. The material, views,
and opinions expressed in this presentation are the
author's own and do not reflect the views of Sophos
Ltd. or its affiliates."
Raffael Marty
• Sophos
• PixlCloud
• Loggly
• Splunk
• ArcSight
• IBM Research
• SecViz
• Logging
• Big Data
• SIEM
• Leadership
• Zen
My Provocative Premise
• Cyber Defense / Monitoring / Analytics is still at the level of 1999
• We can’t predict the weather and we have done it since 1 August 1861
o “The weather predicted by the BBC for four days time was just 30-40% accurate”
• Predicting election results anyone?
o “80% chance Clinton will win.”
Outline
5
• Nothing Has Changed in Security (Defense)
• Machine Learning & Artificial Intelligence
• Visualization
• Now What?
Nothing Has Changed in Security
Since 1999
Summary of Technologies
• Firewalls – policy management, auditing a challenge
• IDS/IPS – false positives
• Threat Intelligence – really the same as IDS signatures
• DLP – just an IDS engine
• Vulnerability Scanners – what’s up with those old user interfaces?
• SIEM – still the same issues: parsing, context, prioritization
• Security Analytics – can actually mostly be done with your SIEM
Machine
Learning
8http://theconversation.com/your-questions-answered-on-artificial-intelligence-49645
& Artificial
Intelligence
Is this the answer to all of our
security problems? Is ML and AI
what we have been waiting for?
Definitions
•Statistics - quantifies numbers
•Data Mining - explains patterns
•Machine Learning - predicts with models
•Artificial Intelligence - behaves and reasons
Machine Learning / Data Mining
10
• Anomaly detection (outlier detection)
o What’s “normal”?
• Association rule learning (e.g., items purchased together)
• Clustering
• Classification
• Regression (model the data)
• Summarization
Data Mining in Security
The graph shows an abstract
space with colors being machine
identified clusters.
Machine Learning in Security
•Needs a corpus of data to learn from
•Network traffic analysis
still not working
oNo labeled data
o Not sure what the right
features should be
•Works okay for SPAM
and malware
classification
Artificial Intelligence in Security
•Just calling something AI doesn’t make it AI.
”A program that doesn't simply classify or compute model
parameters, but comes up with novel knowledge that a
security analyst finds insightful.”
Artificial Narrow Intelligence (ANI)
• Computer programs we have today that perform a specific, narrow task: Deep Blue, Amazon recommendations
Artificial General Intelligence (AGI)
• A program that could learn to complete any task
• What many of us imagine when we think of AI, but no one has managed to accomplish it yet
Artificial Superintelligence (ASI)
• Any computer program that is all-around smarter than a human (also see the singularity by Ray Kurzweil)
https://www.chemheritage.org/distillations/magazine/thinking-machines-the-search-for-artificial-intelligence
The Law of Accelerating Returns – Ray Kurzweil
http://waitbutwhy.com/2015/01/artificial-intelligence-revolution-1.html
ML Looses
15
• We have tried many thing:
o Social Network Analysis
o Seasonality detection
o Entropy over time
o Frequent pattern mining
o Clustering
• All kinds of challenges
o Characterize normal
o Extract what has been learned
o Statistical vs. domain anomalies
• Simple works!
Simple - Data Abstraction
16
Simple Works - Monitor Password Resets
17
threshold
outliers have different magnitudes
Approximate Curve
18
fitting a curve distance to curve
Data Mining Applied
19
• Some would sell this as AI
better
threshold
2
0
Simple Works –
Visualization
S e c u r i t y . A n a l y t i c s . I n s i g h t .
“How Can We See,
Not To Confirm - But
To Learn”
- Edward Tufte
Why Visualization?
22
dport
time
Areas To Explore
• Environment specific rather than environment agnostic approaches
o Same IDS signatures for everyone? Same SIEM signatures?
o Real-time threat intel sharing
• Context
o Users don’t think in IP addresses, they think about users
o Topology mapping anyone?
o User-based policies, not machine based
o Adaptive security
• Capture expert knowledge
o Collaborative efforts
• Forget about 3D visualization 😊
Promising Approaches That Will “Change” Security
• Continuous authentication
• Dynamic policy decisions – automation – really closing the loop
o But what products do this well? Open APIs, low f/p, etc.
• Micro segmentation (including SDN?)
• Real-time threat intelligence sharing
• Human assisted machine learning systems
• Crowd sourcing
• End-user involved / assisted decision making
• Eradicate phishing, please!
How Will ML / AI Help?
• Machine learning consists of algorithms that need data
o Garbage in - garbage out
o Data formats and semantics
• Deep learning is just another ML algorithm
o Malware classification (it isn’t necessarily better than other ML algorithms)
o Basically eliminates the feature engineering step
• Many inherent challenges (see https://www.youtube.com/watch?v=CEAMF0TaUUU)
o Distance functions
o Context – need input from HR systems and others
o Choice of algorithm
o Etc.
• Where to use ML
o Classification problems (traffic, binaries, activities, etc.)
o There is good work being done on automating the level 1 analyst
o Look for systems that leverage humans in the loop (see topic of knowledge capture)
Security Visualization Community
26
• http://secviz.org
• List: secviz.org/mailinglist
• Twitter: @secviz
Share, discuss, challenge, and learn about security visualization.
27
Visual Analytics -
Delivering Actionable Security
Intelligence
July 22-25 2017, Las Vegas
big data | analytics | visualization
BlackHat Workshop
Sophos – Security Made Simple
28
• Products usable by non experts
delightful for the security analyst
• Consolidating security capabilities
• Data science to SOLVE problems
not to highlight issues
Analytics
UTM/Next-Gen Firewall
Wireless
Web
Email
Disk Encryption
File Encryption
Endpoint /
Next-Gen Endpoint
Mobile
Server
Sophos Central
Questions?
29
http://slideshare.net/zrlram
@raffaelmarty

More Related Content

What's hot (20)

PPTX
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
PDF
Security in the age of Artificial Intelligence
Faction XYZ
 
PDF
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
 
PDF
Machine Learning in Cyber Security Domain
BGA Cyber Security
 
PPTX
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Alistair Gillespie
 
PPTX
How is ai important to the future of cyber security
Robert Smith
 
PPTX
Machine learning in Cyber Security
RajathV2
 
PPTX
Generative AI and law.pptx
Chris Marsden
 
PDF
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
 
PPTX
Threat hunting foundations: People, process and technology.pptx
Infosec
 
PDF
Artificial Intelligence in cybersecurity
SmartlearningUK
 
PDF
SOC, Amore Mio! | Security Webinar
Splunk
 
PDF
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
PDF
Soc and siem and threat hunting
Vikas Jain
 
PPTX
AI Governance and Ethics - Industry Standards
Ansgar Koene
 
PDF
MITRE AttACK framework it is time you took notice_v1.0
Michael Gough
 
PPTX
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
 
PPTX
Cyber security and AI
DexterJanPineda
 
PDF
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
PPTX
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
Francesco Flammini
 
Security in the age of Artificial Intelligence
Faction XYZ
 
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
 
Machine Learning in Cyber Security Domain
BGA Cyber Security
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Alistair Gillespie
 
How is ai important to the future of cyber security
Robert Smith
 
Machine learning in Cyber Security
RajathV2
 
Generative AI and law.pptx
Chris Marsden
 
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
 
Threat hunting foundations: People, process and technology.pptx
Infosec
 
Artificial Intelligence in cybersecurity
SmartlearningUK
 
SOC, Amore Mio! | Security Webinar
Splunk
 
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
Soc and siem and threat hunting
Vikas Jain
 
AI Governance and Ethics - Industry Standards
Ansgar Koene
 
MITRE AttACK framework it is time you took notice_v1.0
Michael Gough
 
Delivering Security Insights with Data Analytics and Visualization
Raffael Marty
 
Cyber security and AI
DexterJanPineda
 
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
 

Viewers also liked (20)

PDF
Security Insights at Scale
Raffael Marty
 
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
PDF
AfterGlow
Raffael Marty
 
PDF
Visualization in the Age of Big Data
Raffael Marty
 
PDF
Workshop: Big Data Visualization for Security
Raffael Marty
 
PDF
Cyber Security – How Visual Analytics Unlock Insight
Raffael Marty
 
PPTX
3Com 023-11705-0001
savomir
 
PPT
RSA 2006 - Visual Security Event Analysis
Raffael Marty
 
PDF
Sisu - 2º remanejamento UPE
Portal NE10
 
PDF
Arquitectura
Maria Camila
 
PPTX
Suomi nyt
slidesharexi
 
PDF
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
WSO2
 
PPTX
Ніна Матвієнко
aliusia77
 
PPTX
Незалежність
aliusia77
 
PPTX
In-Memory Computing Webcast. Market Predictions 2017
SingleStore
 
PDF
Real-Time Analytics with Confluent and MemSQL
SingleStore
 
PPTX
Azure iot
書廷 林
 
PDF
Big Data Visualization
Raffael Marty
 
PPT
Library 2.0: Opportunities and Challenges
lisbk
 
Security Insights at Scale
Raffael Marty
 
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
Creating Your Own Threat Intel Through Hunting & Visualization
Raffael Marty
 
AfterGlow
Raffael Marty
 
Visualization in the Age of Big Data
Raffael Marty
 
Workshop: Big Data Visualization for Security
Raffael Marty
 
Cyber Security – How Visual Analytics Unlock Insight
Raffael Marty
 
3Com 023-11705-0001
savomir
 
RSA 2006 - Visual Security Event Analysis
Raffael Marty
 
Sisu - 2º remanejamento UPE
Portal NE10
 
Arquitectura
Maria Camila
 
Suomi nyt
slidesharexi
 
WSO2Con USA 2015: Keynote - The Future of Real-Time Analytics and IoT
WSO2
 
Ніна Матвієнко
aliusia77
 
Незалежність
aliusia77
 
In-Memory Computing Webcast. Market Predictions 2017
SingleStore
 
Real-Time Analytics with Confluent and MemSQL
SingleStore
 
Azure iot
書廷 林
 
Big Data Visualization
Raffael Marty
 
Library 2.0: Opportunities and Challenges
lisbk
 
Ad

Similar to AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed (20)

PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Alex Pinto
 
PPTX
Leveraging Machine Learning to Enhance Cybersecurity v2.pptx
Bahaa Farouk
 
PDF
influence of AI in IS
ISACA Riyadh
 
PDF
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
PDF
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
 
PDF
Artificial Intelligence – Time Bomb or The Promised Land?
Raffael Marty
 
PDF
BSidesLV 2013 - Using Machine Learning to Support Information Security
Alex Pinto
 
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Big Data Spain
 
PPTX
Machine Learning in Information Security by Mohammed Zuber
OWASP Delhi
 
PDF
AI in security
Subrat Panda, PhD
 
PPTX
BsidesLVPresso2016_JZeditsv6
Rod Soto
 
PPTX
Machine learning and artificial intelligence as powerful cybersecurity tools
Tech Mobius
 
PPTX
AI for improved surveillance & cybersecurity
Repustate
 
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
PPTX
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
PPTX
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
 
PDF
CIS AIML Beginners Series Part 1
Council Of Information Security
 
PDF
AI & Machine Learning - Etienne Greeff - SecureData
Harry Gunns
 
PPTX
Pushing Machine Learning Down the Security Stack to Make It More Effective fo...
Jonathan Sander
 
PPTX
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Alex Pinto
 
Leveraging Machine Learning to Enhance Cybersecurity v2.pptx
Bahaa Farouk
 
influence of AI in IS
ISACA Riyadh
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
 
Artificial Intelligence – Time Bomb or The Promised Land?
Raffael Marty
 
BSidesLV 2013 - Using Machine Learning to Support Information Security
Alex Pinto
 
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Big Data Spain
 
Machine Learning in Information Security by Mohammed Zuber
OWASP Delhi
 
AI in security
Subrat Panda, PhD
 
BsidesLVPresso2016_JZeditsv6
Rod Soto
 
Machine learning and artificial intelligence as powerful cybersecurity tools
Tech Mobius
 
AI for improved surveillance & cybersecurity
Repustate
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
 
CIS AIML Beginners Series Part 1
Council Of Information Security
 
AI & Machine Learning - Etienne Greeff - SecureData
Harry Gunns
 
Pushing Machine Learning Down the Security Stack to Make It More Effective fo...
Jonathan Sander
 
icon-aiincs-obusolini201809131800-190310184140.pptx
yugandharadahiphale2
 
Ad

More from Raffael Marty (17)

PDF
Exploring the Defender's Advantage
Raffael Marty
 
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Raffael Marty
 
PPTX
How To Drive Value with Security Data
Raffael Marty
 
PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
 
PDF
Understanding the "Intelligence" in AI
Raffael Marty
 
PDF
Security Chat 5.0
Raffael Marty
 
PDF
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
PDF
Visualization for Security
Raffael Marty
 
PDF
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
PDF
DAVIX - Data Analysis and Visualization Linux
Raffael Marty
 
PDF
Cloud - Security - Big Data
Raffael Marty
 
PDF
Supercharging Visualization with Data Mining
Raffael Marty
 
PDF
Security Visualization - Let's Take A Step Back
Raffael Marty
 
PDF
Visual Analytics and Security Intelligence
Raffael Marty
 
PPT
Log Visualization - Bellua BCS 2006
Raffael Marty
 
PPT
Event Graphs - EUSecWest 2006
Raffael Marty
 
PDF
Insider Threat Visualization - HackInTheBox 2007
Raffael Marty
 
Exploring the Defender's Advantage
Raffael Marty
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Raffael Marty
 
How To Drive Value with Security Data
Raffael Marty
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Raffael Marty
 
Understanding the "Intelligence" in AI
Raffael Marty
 
Security Chat 5.0
Raffael Marty
 
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
Visualization for Security
Raffael Marty
 
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty
 
DAVIX - Data Analysis and Visualization Linux
Raffael Marty
 
Cloud - Security - Big Data
Raffael Marty
 
Supercharging Visualization with Data Mining
Raffael Marty
 
Security Visualization - Let's Take A Step Back
Raffael Marty
 
Visual Analytics and Security Intelligence
Raffael Marty
 
Log Visualization - Bellua BCS 2006
Raffael Marty
 
Event Graphs - EUSecWest 2006
Raffael Marty
 
Insider Threat Visualization - HackInTheBox 2007
Raffael Marty
 

Recently uploaded (17)

PDF
The AI Trust Gap: Consumer Attitudes to AI-Generated Content
Exploding Topics
 
PPTX
InOffensive Security_cybersecurity2.pptx
wihib17507
 
PPTX
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
PDF
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
PPT
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
PPTX
Birth-after-Previous-Caesarean-Birth (1).pptx
fermann1
 
PPTX
Internet Basics for class ix. Unit I. Describe
ASHUTOSHKUMAR1131
 
PDF
GEO Strategy 2025: Complete Presentation Deck for AI-Powered Customer Acquisi...
Zam Man
 
PPTX
Finally, My Best IPTV Provider That Understands Movie Lovers Experience IPTVG...
Rafael IPTV
 
PDF
How Much GB RAM Do You Need for Coding? 5 Powerful Reasons 8GB Is More Than E...
freeshopbudget
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PPTX
AI at Your Side: Boost Impact Without Losing the Human Touch (SXSW 2026 Meet ...
maytaldahan
 
PPTX
MSadfadsfafdadfccadradfT_Presentation.pptx
pahalaedward2
 
DOCX
An_Operating_System by chidi kingsley wo
kingsleywokocha4
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
The AI Trust Gap: Consumer Attitudes to AI-Generated Content
Exploding Topics
 
InOffensive Security_cybersecurity2.pptx
wihib17507
 
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
Birth-after-Previous-Caesarean-Birth (1).pptx
fermann1
 
Internet Basics for class ix. Unit I. Describe
ASHUTOSHKUMAR1131
 
GEO Strategy 2025: Complete Presentation Deck for AI-Powered Customer Acquisi...
Zam Man
 
Finally, My Best IPTV Provider That Understands Movie Lovers Experience IPTVG...
Rafael IPTV
 
How Much GB RAM Do You Need for Coding? 5 Powerful Reasons 8GB Is More Than E...
freeshopbudget
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
AI at Your Side: Boost Impact Without Losing the Human Touch (SXSW 2026 Meet ...
maytaldahan
 
MSadfadsfafdadfccadradfT_Presentation.pptx
pahalaedward2
 
An_Operating_System by chidi kingsley wo
kingsleywokocha4
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 

AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed

  • 1. AI & ML in Cyber Security Welcome Back To 1999 - Security Hasn’t Changed Raffael Marty VP Security Analytics BSides Vancouver March 2017
  • 2. Disclaimer © Raffael Marty 2 "This presentation was prepared solely by Raffael Marty in his personal capacity. The material, views, and opinions expressed in this presentation are the author's own and do not reflect the views of Sophos Ltd. or its affiliates."
  • 3. Raffael Marty • Sophos • PixlCloud • Loggly • Splunk • ArcSight • IBM Research • SecViz • Logging • Big Data • SIEM • Leadership • Zen
  • 4. My Provocative Premise • Cyber Defense / Monitoring / Analytics is still at the level of 1999 • We can’t predict the weather and we have done it since 1 August 1861 o “The weather predicted by the BBC for four days time was just 30-40% accurate” • Predicting election results anyone? o “80% chance Clinton will win.”
  • 5. Outline 5 • Nothing Has Changed in Security (Defense) • Machine Learning & Artificial Intelligence • Visualization • Now What?
  • 6. Nothing Has Changed in Security Since 1999
  • 7. Summary of Technologies • Firewalls – policy management, auditing a challenge • IDS/IPS – false positives • Threat Intelligence – really the same as IDS signatures • DLP – just an IDS engine • Vulnerability Scanners – what’s up with those old user interfaces? • SIEM – still the same issues: parsing, context, prioritization • Security Analytics – can actually mostly be done with your SIEM
  • 9. Definitions •Statistics - quantifies numbers •Data Mining - explains patterns •Machine Learning - predicts with models •Artificial Intelligence - behaves and reasons
  • 10. Machine Learning / Data Mining 10 • Anomaly detection (outlier detection) o What’s “normal”? • Association rule learning (e.g., items purchased together) • Clustering • Classification • Regression (model the data) • Summarization
  • 11. Data Mining in Security The graph shows an abstract space with colors being machine identified clusters.
  • 12. Machine Learning in Security •Needs a corpus of data to learn from •Network traffic analysis still not working oNo labeled data o Not sure what the right features should be •Works okay for SPAM and malware classification
  • 13. Artificial Intelligence in Security •Just calling something AI doesn’t make it AI. ”A program that doesn't simply classify or compute model parameters, but comes up with novel knowledge that a security analyst finds insightful.” Artificial Narrow Intelligence (ANI) • Computer programs we have today that perform a specific, narrow task: Deep Blue, Amazon recommendations Artificial General Intelligence (AGI) • A program that could learn to complete any task • What many of us imagine when we think of AI, but no one has managed to accomplish it yet Artificial Superintelligence (ASI) • Any computer program that is all-around smarter than a human (also see the singularity by Ray Kurzweil) https://www.chemheritage.org/distillations/magazine/thinking-machines-the-search-for-artificial-intelligence
  • 14. The Law of Accelerating Returns – Ray Kurzweil http://waitbutwhy.com/2015/01/artificial-intelligence-revolution-1.html
  • 15. ML Looses 15 • We have tried many thing: o Social Network Analysis o Seasonality detection o Entropy over time o Frequent pattern mining o Clustering • All kinds of challenges o Characterize normal o Extract what has been learned o Statistical vs. domain anomalies • Simple works!
  • 16. Simple - Data Abstraction 16
  • 17. Simple Works - Monitor Password Resets 17 threshold outliers have different magnitudes
  • 18. Approximate Curve 18 fitting a curve distance to curve
  • 19. Data Mining Applied 19 • Some would sell this as AI better threshold
  • 21. S e c u r i t y . A n a l y t i c s . I n s i g h t . “How Can We See, Not To Confirm - But To Learn” - Edward Tufte
  • 23. Areas To Explore • Environment specific rather than environment agnostic approaches o Same IDS signatures for everyone? Same SIEM signatures? o Real-time threat intel sharing • Context o Users don’t think in IP addresses, they think about users o Topology mapping anyone? o User-based policies, not machine based o Adaptive security • Capture expert knowledge o Collaborative efforts • Forget about 3D visualization 😊
  • 24. Promising Approaches That Will “Change” Security • Continuous authentication • Dynamic policy decisions – automation – really closing the loop o But what products do this well? Open APIs, low f/p, etc. • Micro segmentation (including SDN?) • Real-time threat intelligence sharing • Human assisted machine learning systems • Crowd sourcing • End-user involved / assisted decision making • Eradicate phishing, please!
  • 25. How Will ML / AI Help? • Machine learning consists of algorithms that need data o Garbage in - garbage out o Data formats and semantics • Deep learning is just another ML algorithm o Malware classification (it isn’t necessarily better than other ML algorithms) o Basically eliminates the feature engineering step • Many inherent challenges (see https://www.youtube.com/watch?v=CEAMF0TaUUU) o Distance functions o Context – need input from HR systems and others o Choice of algorithm o Etc. • Where to use ML o Classification problems (traffic, binaries, activities, etc.) o There is good work being done on automating the level 1 analyst o Look for systems that leverage humans in the loop (see topic of knowledge capture)
  • 26. Security Visualization Community 26 • http://secviz.org • List: secviz.org/mailinglist • Twitter: @secviz Share, discuss, challenge, and learn about security visualization.
  • 27. 27 Visual Analytics - Delivering Actionable Security Intelligence July 22-25 2017, Las Vegas big data | analytics | visualization BlackHat Workshop
  • 28. Sophos – Security Made Simple 28 • Products usable by non experts delightful for the security analyst • Consolidating security capabilities • Data science to SOLVE problems not to highlight issues Analytics UTM/Next-Gen Firewall Wireless Web Email Disk Encryption File Encryption Endpoint / Next-Gen Endpoint Mobile Server Sophos Central

Editor's Notes

  • #2: Have a story ready as an intro! Link that to point B (investment)
  • #11: What is Data Mining?
  • #26: `