Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine...

48
Artificial Intelligence for Cybersecurity Andrea Saracino, IIT-CNR Roma - 29 Ottobre 2018

Transcript of Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine...

Page 1: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Artificial Intelligence for Cybersecurity

Andrea Saracino, IIT-CNR

Roma - 29 Ottobre 2018

Page 2: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative
Page 3: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative
Page 4: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Application of Artificial Intelligence

Page 5: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Application of Artificial Intelligence

Page 6: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Application of Artificial Intelligence

Page 7: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Artificial Intelligence and Machine Learning

Page 8: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Machine Learning

Page 9: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Unsupervised Learning

Page 10: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Clustering

Page 11: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Clustering (2)

• Can be aggregative or divisive

• Able to work on unlabeled data

• Automatically infers patterns out of input data

• Fast thanks to low complexity

• Does not characterize results

Page 12: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Supervised Learning

Page 13: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Supervised Learning - Training

Machine Learning

Algorithm

Input

ExpectedOutput

Model

Page 14: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Supervised Learning - Application

ModelInput Output

Page 15: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Classification

• Assigning a label (class) to each sample of a dataset.

Machine Learning

Algorithm

Input

Label

Model

Page 16: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Feature Extraction

Feature Apple Orange

Shape Not Round Round

Skin Smooth Non-Smooth

Color Not Orange Orange

A1: 0,1,0O1: 1,0,1

Page 17: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Error

Page 18: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Evaluation Indexes

True Acceptance (Match) Rate (TAR) - Probability to correctly match input pattern to a

matching template. It measures the percent of valid inputs which are correctly accepted.

True Rejection (Non Match) Rate (TRR) - Probability to correctly detect non-matching input

pattern to any template stored in the database. It measures the percent of invalid inputs which

are correctly rejected.

False Acceptance Rate (FAR) - Probability to incorrectly match input pattern to a non-matching

template stored in the database. It measures the percent of invalid inputs which are incorrectly

accepted. It is more dangerous than FRR.

False Rejection Rate (FRR) - Probability to fail to detect a match between the input pattern and

a matching template in the database. It measures the percent of valid inputs which are

incorrectly rejected.

Page 19: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Deep Learning-based Methodologies

• Techniques very effective for image recognition problems• Classify objects

• Detecting presence

• Identifying similarities

• Applied widely to face detection starting from 2014

Page 20: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Difference With Machine Learning

Page 21: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Deep learning: architecture structure

Page 22: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Deep CNN architecture example

Page 23: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Applications to Cybersecurity

Page 24: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

SPAM email analysis

Page 25: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

SPAM

• Unsolicited advertisement message sent to a large number of Internet users via email

Page 26: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

SPAM analysis services

Anti-Spam Filter: HAM vs SPAM

• Based on Deep Learning and Bayesian Classifiers

Page 27: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

SPAM analysis service

Threat Identification:

• Advertisement

• Phishing

• Confidential Trick

• Malware

• Portal

Page 28: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Advertisement

Page 29: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Phishing

Page 30: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Scam

Page 31: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Malware

Page 32: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Portal

Page 33: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Spam Campaign

Spammer

BotBot Bot

Bot

Page 34: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

SPAM analysis service

• Campaign Clustering

Page 35: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Categorical Clustering Tree (CCTree)

• Entropy-based clustering algorithm and classifier

• Exploting structural features• Not based on semantic

• Fast and accurate

Page 36: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Malware Analysis

Page 37: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Network Traffic Analysis

Page 38: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative
Page 39: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Techniques

• Sketch analysis for DDoS prevention

• Text analysis for DGA Recognition

• Cybersquatting automated detection

Page 40: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Behavioral Authentication

Page 41: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Gait-Based Authentication

• Using the walking pattern of a person to verify her identity.

• Each person as a completely unique walking pattern• Mix of physical (biometric) elements and behavioral ones.

Page 42: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Gait Analysis

• Analyzing a person movement pattern.• Monitor clinical conditions related to walking pattern

• Fall detection for early assistance to elderly people

• Extraction of features for user identification

Page 43: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Gait Analysis (2)

• Can be performed by means of accelerometers

• Extraction of acceleration on the three axis

• Multiple accelerometers allow to monitor different parts of the body.

Page 44: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Workflow

• Usage of deep learning and accelerometers for user authentication.

Authenticated

Not Authenticated

Monitoring Extraction Filtering Classification

Page 45: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Framework

• Classifier based on Convolutional Neural Network (CNN).

• Features extracted from 5 body sensors

• Readings normalized and filtered for noise reduction

• Normalized readings are used to train and then test deep learningCNN.

Page 46: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Results

Page 47: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Concluding

• More and more application related to cybersecurity exploit AI

• Increasing need of knowledge to design and tune-up specific machine learning methodologies

• Beware of possible malicious use of machine learning

Page 48: Artificial Intelligence for Cybersecurity · Artificial Intelligence and Machine Learning. Machine Learning. Unsupervised Learning. Clustering. Clustering (2) •Can be aggregative

Thank You

[email protected]