Machine Learning And the Peak of Inflated Expectations. TK Keanini Distinguished Engineer June 2018

Similar documents
Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Python Machine Learning

Lecture 1: Machine Learning Basics

Lecture 1: Basic Concepts of Machine Learning

(Sub)Gradient Descent

Welcome to. ECML/PKDD 2004 Community meeting

Introduction to Ensemble Learning Featuring Successes in the Netflix Prize Competition

Generative models and adversarial training

CSL465/603 - Machine Learning

CS Machine Learning

Axiom 2013 Team Description Paper

Modeling user preferences and norms in context-aware systems

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

Business Analytics and Information Tech COURSE NUMBER: 33:136:494 COURSE TITLE: Data Mining and Business Intelligence

Impact of Cluster Validity Measures on Performance of Hybrid Models Based on K-means and Decision Trees

COMPUTER-ASSISTED INDEPENDENT STUDY IN MULTIVARIATE CALCULUS

ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY DOWNLOAD EBOOK : ADVANCED MACHINE LEARNING WITH PYTHON BY JOHN HEARTY PDF

Radius STEM Readiness TM

Laboratorio di Intelligenza Artificiale e Robotica

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

Twitter Sentiment Classification on Sanders Data using Hybrid Approach

Top US Tech Talent for the Top China Tech Company

Predicting Student Attrition in MOOCs using Sentiment Analysis and Neural Networks

Universidade do Minho Escola de Engenharia

Machine Learning from Garden Path Sentences: The Application of Computational Linguistics

On-Line Data Analytics

Rule Learning With Negation: Issues Regarding Effectiveness

Applications of data mining algorithms to analysis of medical data

Management Update: A Growing Market Battle to Deliver E-Learning Systems

Probability and Statistics Curriculum Pacing Guide

A Case Study: News Classification Based on Term Frequency

Writing Research Articles

Introduction to Simulation

Mining Association Rules in Student s Assessment Data

Computerized Adaptive Psychological Testing A Personalisation Perspective

Machine Learning and Data Mining. Ensembles of Learners. Prof. Alexander Ihler

Word Segmentation of Off-line Handwritten Documents

Learning Methods for Fuzzy Systems

Probabilistic Latent Semantic Analysis

What is Thinking (Cognition)?

Reducing Features to Improve Bug Prediction

Evolution of Symbolisation in Chimpanzees and Neural Nets

Dublin City Schools Mathematics Graded Course of Study GRADE 4

Artificial Neural Networks written examination

A Neural Network GUI Tested on Text-To-Phoneme Mapping

Knowledge-Based - Systems

Laboratorio di Intelligenza Artificiale e Robotica

Evolutive Neural Net Fuzzy Filtering: Basic Description

Time series prediction

Exploration. CS : Deep Reinforcement Learning Sergey Levine

Australian Journal of Basic and Applied Sciences

Algebra 1, Quarter 3, Unit 3.1. Line of Best Fit. Overview

AQUA: An Ontology-Driven Question Answering System

Human Emotion Recognition From Speech

MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE

CAFE ESSENTIAL ELEMENTS O S E P P C E A. 1 Framework 2 CAFE Menu. 3 Classroom Design 4 Materials 5 Record Keeping

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

Content-free collaborative learning modeling using data mining

Semi-supervised methods of text processing, and an application to medical concept extraction. Yacine Jernite Text-as-Data series September 17.

Test Effort Estimation Using Neural Network

Is operations research really research?

Reinforcement Learning by Comparing Immediate Reward

WE GAVE A LAWYER BASIC MATH SKILLS, AND YOU WON T BELIEVE WHAT HAPPENED NEXT

Experiment Databases: Towards an Improved Experimental Methodology in Machine Learning

Model Ensemble for Click Prediction in Bing Search Ads

Seminar - Organic Computing

Active Learning. Yingyu Liang Computer Sciences 760 Fall

arxiv: v1 [cs.lg] 15 Jun 2015

Beyond the Blend: Optimizing the Use of your Learning Technologies. Bryan Chapman, Chapman Alliance

Cross-Media Knowledge Extraction in the Car Manufacturing Industry

UNIVERSITY OF CALIFORNIA SANTA CRUZ TOWARDS A UNIVERSAL PARAMETRIC PLAYER MODEL

Henry Tirri* Petri Myllymgki

Course Outline. Course Grading. Where to go for help. Academic Integrity. EE-589 Introduction to Neural Networks NN 1 EE

Knowledge Elicitation Tool Classification. Janet E. Burge. Artificial Intelligence Research Group. Worcester Polytechnic Institute

Guru: A Computer Tutor that Models Expert Human Tutors

MYCIN. The MYCIN Task

Issues in the Mining of Heart Failure Datasets

TD(λ) and Q-Learning Based Ludo Players

Compositional Semantics

BYLINE [Heng Ji, Computer Science Department, New York University,

TextGraphs: Graph-based algorithms for Natural Language Processing

CSC200: Lecture 4. Allan Borodin

Extending Learning Across Time & Space: The Power of Generalization

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

Math 96: Intermediate Algebra in Context

Learning From the Past with Experiment Databases

1.1 Background. 1 Introduction

The stages of event extraction

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System

Comparison of EM and Two-Step Cluster Method for Mixed Data: An Application

Shockwheat. Statistics 1, Activity 1

OCR for Arabic using SIFT Descriptors With Online Failure Prediction

Knowledge based expert systems D H A N A N J A Y K A L B A N D E

Cognitive Thinking Style Sample Report

For Jury Evaluation. The Road to Enlightenment: Generating Insight and Predicting Consumer Actions in Digital Markets

Knowledge Transfer in Deep Convolutional Neural Nets

Rule Learning with Negation: Issues Regarding Effectiveness

A survey of multi-view machine learning

Highlighting and Annotation Tips Foundation Lesson

Chamilo 2.0: A Second Generation Open Source E-learning and Collaboration Platform

Transcription:

Machine Learning And the Peak of Inflated Expectations TK Keanini Distinguished Engineer June 2018

Gartner Hype Cycle for Emerging Technologies 2017 Expectations M A C H I N E L E A R N I N G Source: Gartner (July, 2017) Time Innovation Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity

Vendors Got Us Here Advanced Threats are no match for A.I. Our machines detect threats others cannot 100% predictive

How We Disservice Machine Learning Silver Bullet Marketing No Explanation or Discussion Limited Guidance 2018 Cisco and/or its affiliates. All rights reserved. Cisco Pulbic

M A C H INE L E A RNING What it is

Field of study that gives computers the ability to learn without being explicitly programmed. Arthur Samuel s definition of machine learning in 1959

clustering bayesian clustering bayesian ground truth ground truth instance based instance based ensemble ensemble machine learning algorithms machine learning algorithms regularization regularization rule system rule system classifier classifier deep learning deep learning regression regression neural network neural network decision tree decision tree dimensionality reduction dimensionality reduction N E R D A L E R T Let s define the helpful data science terms

Machine Learning The Big Picture Artificial Intelligence Machine Learning Supervised Learning Unsupervised Learning Reinforcement Learning

Machine Learning Common Techniques Supervised Learning When you know the question you are trying to ask and have examples of it being asked and answered correction Unsupervised Learning You don't have answers and may not fully know the questions Reinforcement Learning The other category Trial and error behavior effective in game scenarios

75% 15% 10% E Supervised Learning Unsupervised Learning Other (Reinforcement Learning, etc.)

What did we do before Machine Learning? Use in combination with Machine Learning a Simple Pattern Matching Statistical Methods Rules and First Order Logic (FoL)

M A C H INE L E A RNING Techniques

Field of study that gives computers the ability to learn without being explicitly programmed. Translation Field of study that gives computers the ability to be implicitly programmed.

Training Classifiers Training Data Machine Learning Algorithm New Data Classifier Prediction

Ground Truth Used in Supervised Learning The 'Ground Truth' is the pairing of example questions and answers. If you can phrase a problem as 'we know this is right, learn a way to answer more questions of this type'. Success depends greatly on the dataset expressing the Question -> Answer mapping.

M A C H INE L E A RNING Pitfalls

One Size Does Not Fit All Other ML Application Security N E R D A L E R T Warning: Success in one domain does not guarantee success in another

What Is At Stake Matters Because you watched Deadpool, you might like Deadpool X-Men: First Class The Flash Captain America: The First Avenger

How did you come to that conclusion? The Explainability Problem Normal Workflow CFO daily calendar Irregular Activity ML detects suspicious activity and suggests remediation Quarantined However, ML cannot articulate *why* it wants to remediate Loss of time and resources

M A C H INE L E A RNING For Security

How We Know Machine Learning is Working Accuracy How often does my classifier give me the correct answer? Precision When my classifier predicts an instance in a certain class, how often does the instance belong to that class? N E R D A L E R T Root mean square error & Logical Regression Translation: On average, how far away are my predictions from what we later know to be true values?

Why is Machine Learning so useful in Security? Static With limited variability or is well-understood Evolving Security The security domain is always evolving, has a large amount of variability, and is not well-understood

Insider Threats and Behavioral Security Analytics Attackers They re not breaking in, they are logging in Detecting Through novelty and outliers Events Turn weak signals into a strong one

Classify the Observable World and Infer the Rest Threat Actor Activity Weird Stuff (but not threat related) Normal Activity

Multi-layer Analytical Pipeline Cascade of specialized layers of Machine Learning algorithms Billions of connections Anomaly Detection and Trust Modeling Event Classification and Entity Modeling Relationship Modeling Multiple-Instance Learning Probabilistic Threat Propagation Neural Networks Graph-Statistical Methods Statistical Methods Information-Theoretical Methods 70+ Unsupervised Anomaly Detectors Dynamic Adaptive Ensemble Creation Rule Mining Random Forests Boosting ML: Supervised Learning Random Graphs Graph Methods Supervised Classifier Training

New Oct. 3 Oct. 4 C&C url Oct. 15 Anomalous http Oct. 16 Heavy uploader Dropbox.com Oct. 25 Oct. 28 Malicious http Recurring Security that Shows its Work 5 3 5 7 3 8 7 8 Malware: sality Dec. 9 28 days 3 Spam tracking #CSPM02 8 Information Stealer #CDCH01

Measure the Right Things Efficacy of the Assertions True/False Positive True/False Negative Overfitting/Undefitting Root Mean Squared Error

Measure the Right Things

Conclusion

What to Ask Your Vendor How are you applying Machine Learning in your product and why? How do you measure its effectiveness? Regarding supervised learning, what are you using for ground truth? What non-machine learning are you using and why? What papers or open-source have you published regarding your analytics? For the ML based assertions, what entailments are provided? 2018 Cisco and/or its affiliates. All rights reserved. Cisco Pulbic

A Good Machine Learning Approach Be Pragmatic Entailments Analytical pipeline, over single technique Success is Domain Specific Measure helpfulness, not mathematical accuracy

N E R D A L E R T Thank you!