Slide 1

Slide 1 text

Charmi Chokshi, ML Engineer @Shipmnts.com @charmichokshi Cyber Intelligence, when Security meets AI DevFest Bangalore 2019

Slide 2

Slide 2 text

Why we have gathered today?

Slide 3

Slide 3 text

How do we humans learn?

Slide 4

Slide 4 text

Learning from humans is just not enough now!

Slide 5

Slide 5 text

No content

Slide 6

Slide 6 text

The world’s most valuable resource is no longer oil, but data

Slide 7

Slide 7 text

Okay, I have the Data. So, what do I do with it?

Slide 8

Slide 8 text

Artificial Intelligence Deep Learning Machine Learning Any technique that enables computers to mimic human intelligence & behaviour A subset of ML, exposing multilayered neural networks to vast amount of data A subset of AI, including statistical techniques to solve the tasks using experience AI vs ML vs DL

Slide 9

Slide 9 text

Classical Programming Machine Learning Rules Rules Data Data Answers Answers Machine Learning

Slide 10

Slide 10 text

But from where these systems are getting data?

Slide 11

Slide 11 text

What gadgets know about you ● A few clicks, and suddenly we given away all of our rights ● How much data we give organisations for free? ● Your phone knows you better than you know yourself* ● Your phone knows: where you went to, who you met, what you read, and what you looked at? ● We are being sorted up in algorithms! *at least true for me :-P

Slide 12

Slide 12 text

The Search for your Identity ● YOU AND ME ARE NOW A COMMODITY! :-) ● The data we generate does not evaporate but are being mined into a trillion-dollar-a-year company :-| ● Credit card swipes, web searches, locations, likes, purchase history, they are all collected in real-time and are connected to our identity, giving any buyer direct access to our emotional pulse :-(

Slide 13

Slide 13 text

You can clear your cookies, delete browser history, but your digital footprints will remain forever...

Slide 14

Slide 14 text

Do I really need to hide my Data? ● You and your data are becoming used to create algorithms as a training example ● You might not face the consequences today itself, but it would affect you and millions of other users gradually ● Are you okay to be judged by a computer?

Slide 15

Slide 15 text

No content

Slide 16

Slide 16 text

The Problem: We let our Data go to the Model

Slide 17

Slide 17 text

The Problem: We care about analytics & recommendations

Slide 18

Slide 18 text

The Solution: Let the Model come to our Data!

Slide 19

Slide 19 text

Federated Learning ● When privacy is needed ● Bandwidth or power consumptions are a concern ● High cost of data transfer ● When model improves with more data ● On-device training (mini-tensorflow) ○ Device is idle ○ Plugged-in ○ On wi-fi connection

Slide 20

Slide 20 text

Can AI become our new Cybersecurity Sheriff?

Slide 21

Slide 21 text

Cyber Security ● Practices designed to Protect ○ Networks ○ Devices ○ Programs ○ Data ● From ○ Attack ○ Damage ○ Unauthorized access

Slide 22

Slide 22 text

How security is typically done? ● Signature / String Matching ● Heuristics defined by the “Experts” ● Binary decision - Pass vs Block ● Security operation analysts (humans) take final decisions

Slide 23

Slide 23 text

How is AI trained for Cybersecurity? ● Like us, hackers leave their digital footprint while attempting to access internal systems too ● Security specialists compile large databases of digital footprints for future reference, to aid in detecting vulnerabilities, and specific patterns by attackers ● With a large enough database of signatures and intrusion patterns, AI can be trained to recognize intrusions as they’re occurring

Slide 24

Slide 24 text

How is AI trained for Cybersecurity? ● Like us, hackers leave their digital footprint while attempting to access internal systems too ● Security specialists compile large databases of digital footprints for future reference, to aid in detecting vulnerabilities, and specific patterns by attackers ● With a large enough database of signatures and intrusion patterns, AI can be trained to recognize intrusions as they’re occurring

Slide 25

Slide 25 text

How is AI trained for Cybersecurity? ● Like us, hackers leave their digital footprint while attempting to access internal systems too ● Security specialists compile large databases of digital footprints for future reference, to aid in detecting vulnerabilities, and specific patterns by attackers ● With a large enough database of signatures and intrusion patterns, AI can be trained to recognize intrusions as they’re occurring ● However, AI is just a tool, it still requires human interference, not only to train AI, but step in if AI makes mistakes

Slide 26

Slide 26 text

ML’s main use in security is to understand what is normal for a system, flag anything unusual, and route it to humans for review

Slide 27

Slide 27 text

No content

Slide 28

Slide 28 text

No content

Slide 29

Slide 29 text

No content

Slide 30

Slide 30 text

No content

Slide 31

Slide 31 text

No content

Slide 32

Slide 32 text

No content

Slide 33

Slide 33 text

Use Cases: Black-hat Hacker vs White-hat Hacker

Slide 34

Slide 34 text

Use Cases: White-hat Hacker ● Spam filter application ● Bypassing ML Anti Virus ● CAPTCHA solving ● Steganography ● Program Analysis ● Fraud Detection ● Vulnerability / Malware Scanning ● Data driven Social Engineering

Slide 35

Slide 35 text

Use Cases: Black-hat Hacker ● Hackers are able to display fully automated cyber attacks, such as generating exploits, patch generation, and launching attacks ● Furthermore, hackers are able to fool learning-based systems ● As an example, hackers can fool self-driving vehicles, by exploiting the vehicle’s road sign detection system, which the AI is trained on

Slide 36

Slide 36 text

Use Cases: Black-hat Hacker ● Hackers are able to display fully automated cyber attacks, such as generating exploits, patch generation, and launching attacks ● Furthermore, hackers are able to fool learning-based systems ● As an example, hackers can fool self-driving vehicles, by exploiting the vehicle’s road sign detection system, which the AI is trained on ● Plausible Solution: Blockchain technology can prevent log file tampering

Slide 37

Slide 37 text

Q&A Comments | Suggestions DevFest Bangalore 2019

Slide 38

Slide 38 text

Charmi Chokshi, ML Engineer @Shipmnts.com @charmichokshi Thank you! Happy learning :) DevFest Bangalore 2019