Large-scale machine learning, be it supervised or unsupervised, has become an important cornerstone of the information systems we use today. It is only natural that it would become a hot topic in Information Security as well, and a large number of security startups have appeared claiming miracles due to their experience with big data technologies even without previous experience in the Information Security field. It turns out not all algorithms and techniques are born equal, and protecting networks and endpoints from attackers is a very different problem then recommendation engines and automated ad bidding. Not to speak of the potentially disastrous results if techniques are applied incorrectly or with a bad sensitivity/specificity calibration.This presentation will describe how information security is a different problem and the challenges intrinsic to this specific field that many first entrants seem to ignore. We will discuss strengths and caveats of unsupervised and supervised models in this scenario and where they have historically been applied in different segments of InfoSec. It will provide all the background in Information Security you may need to enjoy it, and will shed some light on burning questions about "why isn’t this all secure with deep learning already?" and "if I can decide to bid on an ad in milliseconds, why can't I use this tech to block an attacker?".
Table of contents
- Title: Secure Because Math? Challenges on Applying Machine Learning to Security
- Release date: December 2015
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491954850
You might also like
Modern Python LiveLessons: Big Ideas and Little Code in Python
Overview Modern Python LiveLessons: Big Ideas and Little Code in Python provides developers with an approach …
Generative Deep Learning, 2nd Edition
Generative AI is the hottest topic in tech. This practical book teaches machine learning engineers and …
SQL for Data Analysis
With the explosion of data, computing power, and cloud data warehouses, SQL has become an even …
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …