Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Machine Learning for InfoSec

krupa
August 18, 2019

Machine Learning for InfoSec

krupa

August 18, 2019
Tweet

More Decks by krupa

Other Decks in Technology

Transcript

  1. Supervised learning Unsupervised learning Map Input variables/features to some discrete

    value Map Input variables/features to some Continuous value Data analysis to find hidden patterns/grouping in data
  2. Learning (determining) good values for all the weights and the

    bias from labeled examples (With minimum loss) that model can able to predict new unseen data value. Given an X (input Features) and Y (target/label) GOAL
  3. Loss • loss is a number indicating how bad the

    model's prediction was on a single example. If the model's prediction is perfect, the loss is zero; otherwise, the loss is greater.
  4. Linear Regression with One Variable Problem : Here we will

    implement linear regression with one variable to predict profits for a food truck. Suppose you are the CEO of a restaurant franchise and are considering different cities for opening a new outlet. The chain already has trucks in various cities and you have data for profits and populations from the cities. http://bit.ly/linearReg (colab) File-> Save a copy in drive http://bit.ly/datasetex1(Dataset)
  5. Theory Instead of predicting exactly 0 or 1, logistic regression

    generates a probability—a value between 0 and 1, exclusive Many problems require a probability estimate as output. Logistic regression is an extremely efficient mechanism for calculating probabilities. Log Loss is the loss function for logistic regression.
  6. Perceptron Perceptron is a single layer neural network and a

    multi-layer perceptron is called Neural Networks. Perceptron is a linear classifier (binary). Also, it is used in supervised learning.
  7. There will always be a man trying to find weaknesses

    in systems or ML algorithms and to bypass security mechanisms. What’s worse, now hackers are able to use machine learning to carry out all their nefarious endeavors.[1]