SlideShare una empresa de Scribd logo
1 de 23
• Double Content
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
• Double Content
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
Sub-copy to go here
1
Security is AI’s biggest challenge,
AI is Security’s greatest opportunity
Dr. Rajarshi Gupta | Head of AI, Avast | Sep 2018
Security is AI’s biggest challenge,
AI is Security’s greatest opportunity
Dr. Rajarshi Gupta | Head of AI, Avast | Nov 2018
ONLY domain of AI where
there is a true adversary who
can also make use ofAI
BLACK HAT WHITE HAT
Security is AI’s Biggest Challenge
2
Most threats have very
short longevity; machines
can act muchfaster
VELOCITY SPEED
VARIETY ACCURACY
ML is also really good at
taking into account large
amounts of contextualdata
VOLUME SCALABILITY
Coping with the sheer volume
of new threats would be
impossible without ML
AI is Security’s Greatest Opportunity
3
Come pit your AI skills
against a true adversary
4344
MACHINE
LEARNING
AVAST CLOUD ENGINE
MONTHLY
ENGAGEMEN
T
290M+
145M
+
MONTHLY
ENGAGEMENT
> 10,000 Servers
Across 10 Locations
Worldwide, processing
monthly:
> 300M Files
> 200Bn URLs
Every Month,
Avast:
Handles 30+ million
new executable files, 25
percent of which are
usually malicious
continuously
sifts through 390TB of
quality security
data
Every Month, Avast:
Prevents +2 billion
malware attacks
Pushes 50 PB of data
The World's Largest Consumer SecurityNetwork
5
1. WEB SHIELD
2. STATIC SCANNER
3. EMULATOR
4. DEEP SCREEN (SANDBOX)
5. CYBER CAPTURE
6. BEHAVIOUR SHIELD
Agenda for This Talk
6
• Malware Detection in the Cloud
• Network Detection for IoT
• Defense against Adversarial AI
Malware Detection
in the Cloud
Advanced Threat Detection and PreventionArchitecture:
No silverbullet
8
AVAST NEXT GENERATION AV PLATFORM
1. WEB SHIELD: protects at the entry level against network-
based exploits, malicious URLs and anomalies
2. STATIC SCANNER: performs real-timesecurity
assessments using cloud-based reputationdata
and the local classificationengine
3. WEB SHIELD: protects at the entry level against network-
based exploits, malicious URLs and anomalies
4. DEEPSCREEN (SANDBOX): secures ahypervisor-based
virtual environment to test suspect files
5. CYBER CAPTURE: uses the full power ofAvast’s threat
lab’s “clean room” to assess a file’s innermost workings
6. BEHAVIOR SHIELD: monitors each environment as
programs run and protects against malicious behavior
1.WEBSHIELD
2.STATICSCANNER
3.EMULATOR
4.DEEPSCREEN(SANDBOX)
5.CYBERCAPTURE
6.CYBERCAPTURE
Avast Local Expert390 TB of Quality Data 3,000 Intelligently-Designed Clusters
Months of Processing... ... Completed Daily in Real-Time
COLLECTION EXTRACTION TRAINING EXECUTION
Harness as much
data as possible
Deconstruct data into
billions of artifacts
Update models to understand
the intention of a sample
Precisely and quickly identify
what is benign vs. malicious
6X more consumer
PC users than the
nearest competitor(1)
Proprietary Local Expert architecture
leverages over 500+ features
(e.g. size, origin, age, and file entropy)
New models can be trained on
the entire historical dataset in
less than 12 hours
Endpoint-based models are
updated 200+ times per day
Goal:
Avast
Advantage:
Training the Avast Machine LearningEngine
9
Purpose-built approach that takes < 12 hours to add
new features, train, and deploy into production
Using Neural Nets to Optimize the Engine
Published at ICLR2018
• Goal: augment our traditional handcrafted
models with machine-generatedfeatures
Train a Convolutional Neural Net using the raw
sequence of bytes from the binary files
Training set of 20 million Windows PE files
• Results
Raw model achieves comparable accuracy to hand crafted features
Choosing machine-generated features makes it much harder to evade
Enriched features model shows extra gain of using both sets of features
1
0
Network Detection
for IoT Devices
Managing IoT Security
Problem Mitigation
✓ Every device isconnected
✓ Devices are built by non-security companies
whose motivations are lower prices and easier
connectivity, notsecurity
✓ Rarely or neverpatched
✓ Mostly opaque/closed deviceswith
no securitysoftware
✓ Need to observe from the network
✓ Each device is limited in its applications
✓ Structuredand repetitivebehavior– easyto model
19
POINT OF
INFECTION VIDEO CAMERA
URL
VIDEO CAMERA
DNS
Gateway
BEFORE MIRAI INFECTION DURING MIRAI INFECTION
VIDEO CAMERA
9.0.91.38
9.0.0.125
9.0.0.185
9.0.0.245
9.0.1.82
9.0.100.68
9.0.102.77
9.0.105.66
9.0.108.148
9.0.109.16
9.0.110.172
9.0.113.202
9.0.115.171
9.0.118.154
MIRAI_BOT
MIRAI_REPORT
MIRAI_CNC
9.0.239.143
9.0.83.160
Detecting A SmartHome Security Breach
20
HOW WHAT
How We Protect IoT Devices
Swarm
Behavior
Network
Type of
Data Sent
Infrastructure
Analysis
Amount of
Data Sent
Device Types
Traffic
Analysis
Capabilities
Vulnerabilities
14
Detecting Anomalies on IoT Traffic
Router
Unknown
MalwareSpread
DataLeak
HVACTV PrinterMusic HomeAssistantCamera New
DoS
IoTSurface
GameConsole
Two parallel approaches
Build an ensemble classifier in incremental steps, with models focused on known attacks
Build a deep neural net that is broad enough to identify all the known attacks, and more
15
ATTACK TYPE
May focus on a device
type, or servicetype
DEVICE TYPE
IoT devices have
very limitedbehavior
Identifying devices allow
us to model their behavior
SERVICE TYPE
Many devices plus
internet makes up
services, e.g.Netflix
Multi-Level ModelInput: Flow statistics from millions of homes
Deep Neural Net for IoT Traffic
Benign
Block access
to this domain
Block feed
transmission
Block communication
between these devices
Anomalies
Device
type
Input device traffic
information for
many devices, in
many homes over
a long timeperiod
Home
Type
Servic
e
Type
DDos: Many devices
attacking same domain
Benign
Unexpected
destination for
baby monitor feed
Benign
Unexpected traffic
between devices
within a home
Output: Autonomously identify anomalous traffic
Recognize unknown attacks
Identify the device or service causing the attacks
16
Defense Against
Adversarial AI
DeepFake: Human Beings are Easy to Fool
18
Source: Buzzfeed
AI generated video having President Obama “speak” fake words
Deep Learning Algorithms are also Easy to Fool
LabTest Summary
(Stationary)
Target Class: Speed Limit 45
Misclassify
SubtlePoster SubtlePoster CamoGraffiti CamoArt CamoArt
Evtimov, Ivan, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li,
Atul Prakash,Amir Rahmati, and Dawn Song. "Robust Physical-WorldAttacks
on Machine Learning Models." arXiv preprint arXiv: 1707.08945 (2017).
19
DeepAttacks
Definition: Malicious Content Automatically Generated by AI Algorithms
Video
Audio
Images
URLs & Webpages
Binary Files
Network Flows
Upcoming Existing
20
Use the response
to learn about the
Classifier and
improve guess
Defense 1: Track the
queries and limit the
number of attempts
CLASSIFIER
21
ATTACKER
Defense 2: Train the Classifier
simultaneously with own version of
Attacker, in order to make it better
at identifying generated examples
ATTACKER
DeepAttacks: Defenses in Security
Try an example
Response: Good/Bad
Generative Adversarial Network (GAN)
Defense 3: Build targeted models
to identify the handiwork of such
ML-based generators
Conclusion
Come pit your AI skills
against a true adversary
23

Más contenido relacionado

La actualidad más candente

IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalSyam Madanapalli
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsChetan Kumar S
 
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...AugmentedWorldExpo
 
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...AugmentedWorldExpo
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTIoT613
 
Fog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesFog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesRamneek Kalra
 
Qualcomm: How to take advantage of XR over 5G in 2019: Understanding XR Viewers
Qualcomm: How to take advantage of XR over 5G in 2019: Understanding XR ViewersQualcomm: How to take advantage of XR over 5G in 2019: Understanding XR Viewers
Qualcomm: How to take advantage of XR over 5G in 2019: Understanding XR ViewersAugmentedWorldExpo
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computingsairamgoud16
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Md. Nasir Uddin
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - splitPhuc (Peter) Huynh
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]Ian Skerrett
 
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...DevOps.com
 
IoT Developer Survey 2017
IoT Developer Survey 2017IoT Developer Survey 2017
IoT Developer Survey 2017Ian Skerrett
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
OIT Technology, Communications, Japan
OIT Technology, Communications, JapanOIT Technology, Communications, Japan
OIT Technology, Communications, JapanChristos Makiyama
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architectureElias Hasnat
 
Introduction to the IoT using AWS
Introduction to the IoT using AWSIntroduction to the IoT using AWS
Introduction to the IoT using AWSVolodymyr Rudyi
 

La actualidad más candente (20)

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platforms
 
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
Joshua Ness (Verizon 5G Labs): How 5G will drive a hardware revolution (and h...
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
Fog Computing & Emerging Technologies
Fog Computing & Emerging TechnologiesFog Computing & Emerging Technologies
Fog Computing & Emerging Technologies
 
Qualcomm: How to take advantage of XR over 5G in 2019: Understanding XR Viewers
Qualcomm: How to take advantage of XR over 5G in 2019: Understanding XR ViewersQualcomm: How to take advantage of XR over 5G in 2019: Understanding XR Viewers
Qualcomm: How to take advantage of XR over 5G in 2019: Understanding XR Viewers
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
Iot privacy-soscon-2019
Iot privacy-soscon-2019Iot privacy-soscon-2019
Iot privacy-soscon-2019
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - split
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]
 
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
ADLINK And InfluxDB Deliver Operational Efficiency For Defense Industry With ...
 
IoT Developer Survey 2017
IoT Developer Survey 2017IoT Developer Survey 2017
IoT Developer Survey 2017
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
OIT Technology, Communications, Japan
OIT Technology, Communications, JapanOIT Technology, Communications, Japan
OIT Technology, Communications, Japan
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
Introduction to the IoT using AWS
Introduction to the IoT using AWSIntroduction to the IoT using AWS
Introduction to the IoT using AWS
 

Similar a Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Security’s greatest opportunity

JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JSFestUA
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015Daniel Miessler
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksAsep Sopyan
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryBlack Duck by Synopsys
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliveryTim Mackey
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudWSO2
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 

Similar a Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Security’s greatest opportunity (20)

JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015IoT Attack Surfaces -- DEFCON 2015
IoT Attack Surfaces -- DEFCON 2015
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloudA Reference Architecture for IoT: How to create a resilient, secure IoT cloud
A Reference Architecture for IoT: How to create a resilient, secure IoT cloud
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 

Más de AI Frontiers

Divya Jain at AI Frontiers : Video Summarization
Divya Jain at AI Frontiers : Video SummarizationDivya Jain at AI Frontiers : Video Summarization
Divya Jain at AI Frontiers : Video SummarizationAI Frontiers
 
Training at AI Frontiers 2018 - LaiOffer Data Session: How Spark Speedup AI
Training at AI Frontiers 2018 - LaiOffer Data Session: How Spark Speedup AI Training at AI Frontiers 2018 - LaiOffer Data Session: How Spark Speedup AI
Training at AI Frontiers 2018 - LaiOffer Data Session: How Spark Speedup AI AI Frontiers
 
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 1: Heuristi...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 1: Heuristi...Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 1: Heuristi...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 1: Heuristi...AI Frontiers
 
Training at AI Frontiers 2018 - Ni Lao: Weakly Supervised Natural Language Un...
Training at AI Frontiers 2018 - Ni Lao: Weakly Supervised Natural Language Un...Training at AI Frontiers 2018 - Ni Lao: Weakly Supervised Natural Language Un...
Training at AI Frontiers 2018 - Ni Lao: Weakly Supervised Natural Language Un...AI Frontiers
 
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-lecture 2: Incremen...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-lecture 2: Incremen...Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-lecture 2: Incremen...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-lecture 2: Incremen...AI Frontiers
 
Training at AI Frontiers 2018 - Udacity: Enhancing NLP with Deep Neural Networks
Training at AI Frontiers 2018 - Udacity: Enhancing NLP with Deep Neural NetworksTraining at AI Frontiers 2018 - Udacity: Enhancing NLP with Deep Neural Networks
Training at AI Frontiers 2018 - Udacity: Enhancing NLP with Deep Neural NetworksAI Frontiers
 
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 3: Any-Angl...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 3: Any-Angl...Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 3: Any-Angl...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 3: Any-Angl...AI Frontiers
 
Training at AI Frontiers 2018 - Lukasz Kaiser: Sequence to Sequence Learning ...
Training at AI Frontiers 2018 - Lukasz Kaiser: Sequence to Sequence Learning ...Training at AI Frontiers 2018 - Lukasz Kaiser: Sequence to Sequence Learning ...
Training at AI Frontiers 2018 - Lukasz Kaiser: Sequence to Sequence Learning ...AI Frontiers
 
Percy Liang at AI Frontiers : Pushing the Limits of Machine Learning
Percy Liang at AI Frontiers : Pushing the Limits of Machine LearningPercy Liang at AI Frontiers : Pushing the Limits of Machine Learning
Percy Liang at AI Frontiers : Pushing the Limits of Machine LearningAI Frontiers
 
Ilya Sutskever at AI Frontiers : Progress towards the OpenAI mission
Ilya Sutskever at AI Frontiers : Progress towards the OpenAI missionIlya Sutskever at AI Frontiers : Progress towards the OpenAI mission
Ilya Sutskever at AI Frontiers : Progress towards the OpenAI missionAI Frontiers
 
Mark Moore at AI Frontiers : Uber Elevate
Mark Moore at AI Frontiers : Uber ElevateMark Moore at AI Frontiers : Uber Elevate
Mark Moore at AI Frontiers : Uber ElevateAI Frontiers
 
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...AI Frontiers
 
Anima Anandkumar at AI Frontiers : Modern ML : Deep, distributed, Multi-dimen...
Anima Anandkumar at AI Frontiers : Modern ML : Deep, distributed, Multi-dimen...Anima Anandkumar at AI Frontiers : Modern ML : Deep, distributed, Multi-dimen...
Anima Anandkumar at AI Frontiers : Modern ML : Deep, distributed, Multi-dimen...AI Frontiers
 
Wei Xu at AI Frontiers : Language Learning in an Interactive and Embodied Set...
Wei Xu at AI Frontiers : Language Learning in an Interactive and Embodied Set...Wei Xu at AI Frontiers : Language Learning in an Interactive and Embodied Set...
Wei Xu at AI Frontiers : Language Learning in an Interactive and Embodied Set...AI Frontiers
 
Sumit Gupta at AI Frontiers : AI for Enterprise
Sumit Gupta at AI Frontiers : AI for EnterpriseSumit Gupta at AI Frontiers : AI for Enterprise
Sumit Gupta at AI Frontiers : AI for EnterpriseAI Frontiers
 
Yuandong Tian at AI Frontiers : Planning in Reinforcement Learning
Yuandong Tian at AI Frontiers : Planning in Reinforcement LearningYuandong Tian at AI Frontiers : Planning in Reinforcement Learning
Yuandong Tian at AI Frontiers : Planning in Reinforcement LearningAI Frontiers
 
Alex Ermolaev at AI Frontiers : Major Applications of AI in Healthcare
Alex Ermolaev at AI Frontiers : Major Applications of AI in HealthcareAlex Ermolaev at AI Frontiers : Major Applications of AI in Healthcare
Alex Ermolaev at AI Frontiers : Major Applications of AI in HealthcareAI Frontiers
 
Long Lin at AI Frontiers : AI in Gaming
Long Lin at AI Frontiers : AI in GamingLong Lin at AI Frontiers : AI in Gaming
Long Lin at AI Frontiers : AI in GamingAI Frontiers
 
Melissa Goldman at AI Frontiers : AI & Finance
Melissa Goldman at AI Frontiers : AI & FinanceMelissa Goldman at AI Frontiers : AI & Finance
Melissa Goldman at AI Frontiers : AI & FinanceAI Frontiers
 
Li Deng at AI Frontiers : From Modeling Speech/Language to Modeling Financial...
Li Deng at AI Frontiers : From Modeling Speech/Language to Modeling Financial...Li Deng at AI Frontiers : From Modeling Speech/Language to Modeling Financial...
Li Deng at AI Frontiers : From Modeling Speech/Language to Modeling Financial...AI Frontiers
 

Más de AI Frontiers (20)

Divya Jain at AI Frontiers : Video Summarization
Divya Jain at AI Frontiers : Video SummarizationDivya Jain at AI Frontiers : Video Summarization
Divya Jain at AI Frontiers : Video Summarization
 
Training at AI Frontiers 2018 - LaiOffer Data Session: How Spark Speedup AI
Training at AI Frontiers 2018 - LaiOffer Data Session: How Spark Speedup AI Training at AI Frontiers 2018 - LaiOffer Data Session: How Spark Speedup AI
Training at AI Frontiers 2018 - LaiOffer Data Session: How Spark Speedup AI
 
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 1: Heuristi...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 1: Heuristi...Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 1: Heuristi...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 1: Heuristi...
 
Training at AI Frontiers 2018 - Ni Lao: Weakly Supervised Natural Language Un...
Training at AI Frontiers 2018 - Ni Lao: Weakly Supervised Natural Language Un...Training at AI Frontiers 2018 - Ni Lao: Weakly Supervised Natural Language Un...
Training at AI Frontiers 2018 - Ni Lao: Weakly Supervised Natural Language Un...
 
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-lecture 2: Incremen...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-lecture 2: Incremen...Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-lecture 2: Incremen...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-lecture 2: Incremen...
 
Training at AI Frontiers 2018 - Udacity: Enhancing NLP with Deep Neural Networks
Training at AI Frontiers 2018 - Udacity: Enhancing NLP with Deep Neural NetworksTraining at AI Frontiers 2018 - Udacity: Enhancing NLP with Deep Neural Networks
Training at AI Frontiers 2018 - Udacity: Enhancing NLP with Deep Neural Networks
 
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 3: Any-Angl...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 3: Any-Angl...Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 3: Any-Angl...
Training at AI Frontiers 2018 - LaiOffer Self-Driving-Car-Lecture 3: Any-Angl...
 
Training at AI Frontiers 2018 - Lukasz Kaiser: Sequence to Sequence Learning ...
Training at AI Frontiers 2018 - Lukasz Kaiser: Sequence to Sequence Learning ...Training at AI Frontiers 2018 - Lukasz Kaiser: Sequence to Sequence Learning ...
Training at AI Frontiers 2018 - Lukasz Kaiser: Sequence to Sequence Learning ...
 
Percy Liang at AI Frontiers : Pushing the Limits of Machine Learning
Percy Liang at AI Frontiers : Pushing the Limits of Machine LearningPercy Liang at AI Frontiers : Pushing the Limits of Machine Learning
Percy Liang at AI Frontiers : Pushing the Limits of Machine Learning
 
Ilya Sutskever at AI Frontiers : Progress towards the OpenAI mission
Ilya Sutskever at AI Frontiers : Progress towards the OpenAI missionIlya Sutskever at AI Frontiers : Progress towards the OpenAI mission
Ilya Sutskever at AI Frontiers : Progress towards the OpenAI mission
 
Mark Moore at AI Frontiers : Uber Elevate
Mark Moore at AI Frontiers : Uber ElevateMark Moore at AI Frontiers : Uber Elevate
Mark Moore at AI Frontiers : Uber Elevate
 
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
 
Anima Anandkumar at AI Frontiers : Modern ML : Deep, distributed, Multi-dimen...
Anima Anandkumar at AI Frontiers : Modern ML : Deep, distributed, Multi-dimen...Anima Anandkumar at AI Frontiers : Modern ML : Deep, distributed, Multi-dimen...
Anima Anandkumar at AI Frontiers : Modern ML : Deep, distributed, Multi-dimen...
 
Wei Xu at AI Frontiers : Language Learning in an Interactive and Embodied Set...
Wei Xu at AI Frontiers : Language Learning in an Interactive and Embodied Set...Wei Xu at AI Frontiers : Language Learning in an Interactive and Embodied Set...
Wei Xu at AI Frontiers : Language Learning in an Interactive and Embodied Set...
 
Sumit Gupta at AI Frontiers : AI for Enterprise
Sumit Gupta at AI Frontiers : AI for EnterpriseSumit Gupta at AI Frontiers : AI for Enterprise
Sumit Gupta at AI Frontiers : AI for Enterprise
 
Yuandong Tian at AI Frontiers : Planning in Reinforcement Learning
Yuandong Tian at AI Frontiers : Planning in Reinforcement LearningYuandong Tian at AI Frontiers : Planning in Reinforcement Learning
Yuandong Tian at AI Frontiers : Planning in Reinforcement Learning
 
Alex Ermolaev at AI Frontiers : Major Applications of AI in Healthcare
Alex Ermolaev at AI Frontiers : Major Applications of AI in HealthcareAlex Ermolaev at AI Frontiers : Major Applications of AI in Healthcare
Alex Ermolaev at AI Frontiers : Major Applications of AI in Healthcare
 
Long Lin at AI Frontiers : AI in Gaming
Long Lin at AI Frontiers : AI in GamingLong Lin at AI Frontiers : AI in Gaming
Long Lin at AI Frontiers : AI in Gaming
 
Melissa Goldman at AI Frontiers : AI & Finance
Melissa Goldman at AI Frontiers : AI & FinanceMelissa Goldman at AI Frontiers : AI & Finance
Melissa Goldman at AI Frontiers : AI & Finance
 
Li Deng at AI Frontiers : From Modeling Speech/Language to Modeling Financial...
Li Deng at AI Frontiers : From Modeling Speech/Language to Modeling Financial...Li Deng at AI Frontiers : From Modeling Speech/Language to Modeling Financial...
Li Deng at AI Frontiers : From Modeling Speech/Language to Modeling Financial...
 

Último

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Último (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Security’s greatest opportunity

  • 1. • Double Content Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here • Double Content Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here Sub-copy to go here 1 Security is AI’s biggest challenge, AI is Security’s greatest opportunity Dr. Rajarshi Gupta | Head of AI, Avast | Sep 2018 Security is AI’s biggest challenge, AI is Security’s greatest opportunity Dr. Rajarshi Gupta | Head of AI, Avast | Nov 2018
  • 2. ONLY domain of AI where there is a true adversary who can also make use ofAI BLACK HAT WHITE HAT Security is AI’s Biggest Challenge 2
  • 3. Most threats have very short longevity; machines can act muchfaster VELOCITY SPEED VARIETY ACCURACY ML is also really good at taking into account large amounts of contextualdata VOLUME SCALABILITY Coping with the sheer volume of new threats would be impossible without ML AI is Security’s Greatest Opportunity 3
  • 4. Come pit your AI skills against a true adversary 4344
  • 5. MACHINE LEARNING AVAST CLOUD ENGINE MONTHLY ENGAGEMEN T 290M+ 145M + MONTHLY ENGAGEMENT > 10,000 Servers Across 10 Locations Worldwide, processing monthly: > 300M Files > 200Bn URLs Every Month, Avast: Handles 30+ million new executable files, 25 percent of which are usually malicious continuously sifts through 390TB of quality security data Every Month, Avast: Prevents +2 billion malware attacks Pushes 50 PB of data The World's Largest Consumer SecurityNetwork 5 1. WEB SHIELD 2. STATIC SCANNER 3. EMULATOR 4. DEEP SCREEN (SANDBOX) 5. CYBER CAPTURE 6. BEHAVIOUR SHIELD
  • 6. Agenda for This Talk 6 • Malware Detection in the Cloud • Network Detection for IoT • Defense against Adversarial AI
  • 8. Advanced Threat Detection and PreventionArchitecture: No silverbullet 8 AVAST NEXT GENERATION AV PLATFORM 1. WEB SHIELD: protects at the entry level against network- based exploits, malicious URLs and anomalies 2. STATIC SCANNER: performs real-timesecurity assessments using cloud-based reputationdata and the local classificationengine 3. WEB SHIELD: protects at the entry level against network- based exploits, malicious URLs and anomalies 4. DEEPSCREEN (SANDBOX): secures ahypervisor-based virtual environment to test suspect files 5. CYBER CAPTURE: uses the full power ofAvast’s threat lab’s “clean room” to assess a file’s innermost workings 6. BEHAVIOR SHIELD: monitors each environment as programs run and protects against malicious behavior 1.WEBSHIELD 2.STATICSCANNER 3.EMULATOR 4.DEEPSCREEN(SANDBOX) 5.CYBERCAPTURE 6.CYBERCAPTURE
  • 9. Avast Local Expert390 TB of Quality Data 3,000 Intelligently-Designed Clusters Months of Processing... ... Completed Daily in Real-Time COLLECTION EXTRACTION TRAINING EXECUTION Harness as much data as possible Deconstruct data into billions of artifacts Update models to understand the intention of a sample Precisely and quickly identify what is benign vs. malicious 6X more consumer PC users than the nearest competitor(1) Proprietary Local Expert architecture leverages over 500+ features (e.g. size, origin, age, and file entropy) New models can be trained on the entire historical dataset in less than 12 hours Endpoint-based models are updated 200+ times per day Goal: Avast Advantage: Training the Avast Machine LearningEngine 9 Purpose-built approach that takes < 12 hours to add new features, train, and deploy into production
  • 10. Using Neural Nets to Optimize the Engine Published at ICLR2018 • Goal: augment our traditional handcrafted models with machine-generatedfeatures Train a Convolutional Neural Net using the raw sequence of bytes from the binary files Training set of 20 million Windows PE files • Results Raw model achieves comparable accuracy to hand crafted features Choosing machine-generated features makes it much harder to evade Enriched features model shows extra gain of using both sets of features 1 0
  • 12. Managing IoT Security Problem Mitigation ✓ Every device isconnected ✓ Devices are built by non-security companies whose motivations are lower prices and easier connectivity, notsecurity ✓ Rarely or neverpatched ✓ Mostly opaque/closed deviceswith no securitysoftware ✓ Need to observe from the network ✓ Each device is limited in its applications ✓ Structuredand repetitivebehavior– easyto model 19
  • 13. POINT OF INFECTION VIDEO CAMERA URL VIDEO CAMERA DNS Gateway BEFORE MIRAI INFECTION DURING MIRAI INFECTION VIDEO CAMERA 9.0.91.38 9.0.0.125 9.0.0.185 9.0.0.245 9.0.1.82 9.0.100.68 9.0.102.77 9.0.105.66 9.0.108.148 9.0.109.16 9.0.110.172 9.0.113.202 9.0.115.171 9.0.118.154 MIRAI_BOT MIRAI_REPORT MIRAI_CNC 9.0.239.143 9.0.83.160 Detecting A SmartHome Security Breach 20
  • 14. HOW WHAT How We Protect IoT Devices Swarm Behavior Network Type of Data Sent Infrastructure Analysis Amount of Data Sent Device Types Traffic Analysis Capabilities Vulnerabilities 14
  • 15. Detecting Anomalies on IoT Traffic Router Unknown MalwareSpread DataLeak HVACTV PrinterMusic HomeAssistantCamera New DoS IoTSurface GameConsole Two parallel approaches Build an ensemble classifier in incremental steps, with models focused on known attacks Build a deep neural net that is broad enough to identify all the known attacks, and more 15
  • 16. ATTACK TYPE May focus on a device type, or servicetype DEVICE TYPE IoT devices have very limitedbehavior Identifying devices allow us to model their behavior SERVICE TYPE Many devices plus internet makes up services, e.g.Netflix Multi-Level ModelInput: Flow statistics from millions of homes Deep Neural Net for IoT Traffic Benign Block access to this domain Block feed transmission Block communication between these devices Anomalies Device type Input device traffic information for many devices, in many homes over a long timeperiod Home Type Servic e Type DDos: Many devices attacking same domain Benign Unexpected destination for baby monitor feed Benign Unexpected traffic between devices within a home Output: Autonomously identify anomalous traffic Recognize unknown attacks Identify the device or service causing the attacks 16
  • 18. DeepFake: Human Beings are Easy to Fool 18 Source: Buzzfeed AI generated video having President Obama “speak” fake words
  • 19. Deep Learning Algorithms are also Easy to Fool LabTest Summary (Stationary) Target Class: Speed Limit 45 Misclassify SubtlePoster SubtlePoster CamoGraffiti CamoArt CamoArt Evtimov, Ivan, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash,Amir Rahmati, and Dawn Song. "Robust Physical-WorldAttacks on Machine Learning Models." arXiv preprint arXiv: 1707.08945 (2017). 19
  • 20. DeepAttacks Definition: Malicious Content Automatically Generated by AI Algorithms Video Audio Images URLs & Webpages Binary Files Network Flows Upcoming Existing 20
  • 21. Use the response to learn about the Classifier and improve guess Defense 1: Track the queries and limit the number of attempts CLASSIFIER 21 ATTACKER Defense 2: Train the Classifier simultaneously with own version of Attacker, in order to make it better at identifying generated examples ATTACKER DeepAttacks: Defenses in Security Try an example Response: Good/Bad Generative Adversarial Network (GAN) Defense 3: Build targeted models to identify the handiwork of such ML-based generators
  • 23. Come pit your AI skills against a true adversary 23