Thinking in the Box Artificial Intelligence for Cyber T&E. Presented by Turin Pollard, Evelyn Rockwell, and Chris Milroy Alion Science and Technology

Similar documents
Lecture 1: Machine Learning Basics

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Python Machine Learning

Axiom 2013 Team Description Paper

Laboratorio di Intelligenza Artificiale e Robotica

Generative models and adversarial training

System Implementation for SemEval-2017 Task 4 Subtask A Based on Interpolated Deep Neural Networks

Laboratorio di Intelligenza Artificiale e Robotica

Artificial Neural Networks written examination

Lecture 1: Basic Concepts of Machine Learning

(Sub)Gradient Descent

Machine Learning from Garden Path Sentences: The Application of Computational Linguistics

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

Why Did My Detector Do That?!

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

A New Perspective on Combining GMM and DNN Frameworks for Speaker Adaptation

CS Machine Learning

Seminar - Organic Computing

Learning From the Past with Experiment Databases

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

Deep search. Enhancing a search bar using machine learning. Ilgün Ilgün & Cedric Reichenbach

Learning Methods for Fuzzy Systems

Time series prediction

Forget catastrophic forgetting: AI that learns after deployment

Knowledge Transfer in Deep Convolutional Neural Nets

Spring 2015 IET4451 Systems Simulation Course Syllabus for Traditional, Hybrid, and Online Classes

An Introduction to Simio for Beginners

Automating the E-learning Personalization

CS4491/CS 7265 BIG DATA ANALYTICS INTRODUCTION TO THE COURSE. Mingon Kang, PhD Computer Science, Kennesaw State University

Test Effort Estimation Using Neural Network

Human Emotion Recognition From Speech

INPE São José dos Campos

Ph.D in Advance Machine Learning (computer science) PhD submitted, degree to be awarded on convocation, sept B.Tech in Computer science and

Using focal point learning to improve human machine tacit coordination

Probability estimates in a scenario tree

Modeling function word errors in DNN-HMM based LVCSR systems

Model Ensemble for Click Prediction in Bing Search Ads

Word Segmentation of Off-line Handwritten Documents

Evolution of Symbolisation in Chimpanzees and Neural Nets

Australian Journal of Basic and Applied Sciences

A student diagnosing and evaluation system for laboratory-based academic exercises

Understanding and Interpreting the NRC s Data-Based Assessment of Research-Doctorate Programs in the United States (2010)

ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY DOWNLOAD EBOOK : ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY PDF

A Neural Network GUI Tested on Text-To-Phoneme Mapping

A study of speaker adaptation for DNN-based speech synthesis

Unsupervised Learning of Word Semantic Embedding using the Deep Structured Semantic Model

A Reinforcement Learning Variant for Control Scheduling

An OO Framework for building Intelligence and Learning properties in Software Agents

Twitter Sentiment Classification on Sanders Data using Hybrid Approach

Switchboard Language Model Improvement with Conversational Data from Gigaword

The open source development model has unique characteristics that make it in some

arxiv: v2 [cs.cv] 30 Mar 2017

Issues in the Mining of Heart Failure Datasets

CSL465/603 - Machine Learning

Machine Learning and Development Policy

OCR for Arabic using SIFT Descriptors With Online Failure Prediction

Semi-supervised methods of text processing, and an application to medical concept extraction. Yacine Jernite Text-as-Data series September 17.

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS

Reinforcement Learning by Comparing Immediate Reward

Mining Association Rules in Student s Assessment Data

High-level Reinforcement Learning in Strategy Games

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition

Evolutive Neural Net Fuzzy Filtering: Basic Description

Circuit Simulators: A Revolutionary E-Learning Platform

*Net Perceptions, Inc West 78th Street Suite 300 Minneapolis, MN

Institutionen för datavetenskap. Hardware test equipment utilization measurement

Course Outline. Course Grading. Where to go for help. Academic Integrity. EE-589 Introduction to Neural Networks NN 1 EE

Top US Tech Talent for the Top China Tech Company

Testing A Moving Target: How Do We Test Machine Learning Systems? Peter Varhol Technology Strategy Research, USA

Assignment 1: Predicting Amazon Review Ratings

A Genetic Irrational Belief System

Modeling function word errors in DNN-HMM based LVCSR systems

Visual CP Representation of Knowledge

MAE Flight Simulation for Aircraft Safety

Business Analytics and Information Tech COURSE NUMBER: 33:136:494 COURSE TITLE: Data Mining and Business Intelligence

arxiv: v1 [cs.lg] 15 Jun 2015

TD(λ) and Q-Learning Based Ludo Players

Rule Learning With Negation: Issues Regarding Effectiveness

IAT 888: Metacreation Machines endowed with creative behavior. Philippe Pasquier Office 565 (floor 14)

Accelerated Learning Course Outline

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE

Soft Computing based Learning for Cognitive Radio

The Method of Immersion the Problem of Comparing Technical Objects in an Expert Shell in the Class of Artificial Intelligence Algorithms

Deep Neural Network Language Models

A Case Study: News Classification Based on Term Frequency

Attributed Social Network Embedding

ADVANCES IN DEEP NEURAL NETWORK APPROACHES TO SPEAKER RECOGNITION

Machine Learning and Data Mining. Ensembles of Learners. Prof. Alexander Ihler

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System

BUILDING CONTEXT-DEPENDENT DNN ACOUSTIC MODELS USING KULLBACK-LEIBLER DIVERGENCE-BASED STATE TYING

Accelerated Learning Online. Course Outline

An empirical study of learning speed in backpropagation

Software Maintenance

Autoregressive product of multi-frame predictions can improve the accuracy of hybrid models

SARDNET: A Self-Organizing Feature Map for Sequences

We are strong in research and particularly noted in software engineering, information security and privacy, and humane gaming.

Master s Programme in Computer, Communication and Information Sciences, Study guide , ELEC Majors

A Vector Space Approach for Aspect-Based Sentiment Analysis

Comparison of EM and Two-Step Cluster Method for Mixed Data: An Application

Transcription:

Thinking in the Box Artificial Intelligence for Cyber T&E Presented by Turin Pollard, Evelyn Rockwell, and Chris Milroy Alion Science and Technology

Roadmap What is modern Ai? Why is cyber so hard? How can Ai help? SLIDE 2

What? Eras of Ai Artificial Intelligence Machine Learning Deep Learning Rules Models Networks 1950 1980 2010 SLIDE 3 Graphic : Nvidia

What? Working Definitions Artificial intelligence (Ai): doing with computers tasks commonly believed to require intelligence Machine learning (ML): Ai systems that progressively improve their performance with data Training: running data through an ML system until it reaches stable and acceptable performance SLIDE 4

What? Machine Learning Core goal: generalize from training data to mission data Distinct from pure optimization Designed to be executed by machines Many functions Classification: decision tree Clustering: nearest neighbors Value prediction: regression SLIDE 5

What? Working Definitions Neural network (NN)/artificial neural network (ANN): an algorithm structure loosely inspired by neurons in the brain Deep neural network (DNN): a neural network with many layers at least five, but often tens or hundreds Deep learning (DL): ML systems that use DNNs SLIDE 6

What? Deep Learning Machine learning: engineered features, learned parameters Deep learning: learned features, learned parameters SLIDE 7

What? Generative Adversarial Networks Learns how to create new examples like those in a given dataset Competing subnetworks Generator (forger) Discriminator (detective) SLIDE 8

What? Generative Adversarial Networks Dataset Example Discriminator Random Generator Real vs generated Output SLIDE 9

What? Generative Adversarial Networks SLIDE 10

Why? Working with magic magic power without explanation ^ guaranteed, human-level SLIDE 11

Roadmap What is modern Ai? Why is cyber so hard? How can Ai help? SLIDE 12

Why? Asymmetric An Asymmetric Domain Favoring the attacker Adversaries willing to test on live systems A rapidly moving target In an unknown N-Dimensional space Not part of traditional Development Processes SLIDE 13

Why? Requirements Are the requirements sufficient for the mission need? Are the requirements sufficient to build the system? Are the requirements sufficient to against? Does the design meet the requirements? What is the level of confidence in the result? SLIDE 14

Why? Requirements What is the cyber requirement? SLIDE 15

Why? What we do instead Fight the last war Compromise then fix Signatures based blacklists Compliance based engineering Red Team Assessment SLIDE 16

Why? In Search of Sunrise Quantifiable cyber security Durable and Resilient to unknown attacks Not subject to catastrophic compromise Asymmetric in favor of the defender/developer Clearly located in the system life cycle SLIDE 17

Roadmap What is modern Ai? Why is cyber so hard? How can Ai help? SLIDE 18

How? Ai for Cyber T&E Are the results actionable? Are the results repeatable? Do the results provide additional insights, compared to traditional cyber T&E methods? SLIDE 19

How? Automation ML and shallow DL bring machine speed What we do today, only faster Signatures, Profiles, Actors based rule sets Black list based SLIDE 20

How? Anomaly Detection Real Deep Learning White list based First define what is normal Second, identify deviations Without having to explain why SLIDE 21

How? Testing and Evaluation Test systems for zero day vulnerabilities We don t know about We don t have to enumerate Provide actionable results to developers And vectors to our offensive cyber capabilities SLIDE 22

How? Vignette ML automation of known attacks GANs to simulate activity Users and Attackers RNN to monitor Health Expected system state progressions SLIDE 23

How? Next Steps Bring existing Ai based tools into T&E Develop T&E Specific tools Continue improving the development process SLIDE 24

Thank you! tpollard @ AlionScience.com 215.970.0230