Top Banner
Cyber Security and Artificial Intelligence KP CHOW CENTER FOR INFORMATION SECURITY AND CRYPTOGRAPHY UNIVERSITY OF HONG KONG (HKU) JUNE 2018
14

2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Mar 10, 2019

Download

Documents

duongtram
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Cyber Security and Artificial Intelligence

KP CHOWCENTER FOR INFORMATION SECURITY AND CRYPTOGRAPHYUNIVERSITY OF HONG KONG (HKU)

JUNE 2018

Page 2: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Artificial Intelligence (AI)in 1980s Reasoning: Logics, automated reasoning

Expert systems

Natural language processing: parsing and semantic analysis

Machine learning: multi‐value logics

Computer vision: model based approach

Searching: game tree search

Page 3: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

AI Today Neural network and deep learning

Computer vision

NLP

Game playing

Page 4: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Applications in cyber security?

Page 5: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Major Cyber Security Issues New types of malware, ransomware, … 

New types of vulnerabilities, zero days, … 

New devices, IoT devices

New “approaches” to attack, e.g. using IoTdevices as bots

New … 

Page 6: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

66/19/2018

Traditional Reactive Approach in Cyber Security

Traces analysis by security and forensics experts, log analysis, reverse engineering

Install updates to “existing” cyber security products

Traces collected, e.g. logs, malware traces, attack footprint, etc

A New Attack

Vicious cycle under traditional REACTIVEapproach

Page 7: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Can AI help?

Page 8: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Can AI help with the “new” problems? Automatic detection of new malware?

Automatic identification of zero day?

Automatic generation of new protection scheme against new attacks?

Automatic construction of new defense mechanisms for new devices?

Automatic analysis and sharing of cyber security intelligence?

Page 9: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Some existing research Application of deep learning to automatic 

analysis of malware

Application of data mining in behavior analysis to protect against zero days

Application of natural language processing (NLP) to automatic analysis of cyber security intelligence

Page 10: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms
Page 11: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

What we are doing now? We worked with CISC Ltd to build a Cyber Threat 

Intelligence Testbed (using open source software)

Intelligence collection◦ Open source cyber security intelligence through the IaaS (Intelligence‐as‐a‐Service) Platform by CISC Ltd

◦ Data from the SHIELDs◦ Any other cyber threat intelligence

Page 12: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Cyber Security Intelligence

“Intelligence as a Service”

crawl dataAI and Machine Learning Algos

12

Intelligence Collection

SHIELD Data

Cyber Security and Threat Intelligence

Other sources

Page 13: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

What types of cyber security intelligence we have? Cyber security intelligence from social 

media and other sharing platforms◦ Text based◦ May have images◦ Large volume◦ Continuous feed

SHIELD data and others◦ Binary data◦ Unstructured◦ Not human readable

NLP – topic identification and security classification

Deep learning for classification

Page 14: 2A. KP Chow Cyber Security and Artificial Intelligence · What types of cyber security intelligence we have? Cyber security intelligence from social media and other sharing platforms

Thank You

and we prepare to collaborate and share

[email protected]