security
Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack
Deep neural networks face persistent challenges in defending against backdoor attacks, leading to an ongoing battle between attacks and defenses. While existing backdoor defense strategies have shown promising performance on reducing attack success rates, can we confidently claim that the backdoor threat has truly been eliminated from the model? To address it, we re-investigate the characteristics of the backdoored models after defense (denoted as defense models). Surprisingly, we find that the original backdoors still exist in defense models derived from existing post-training defense strategies, and the backdoor existence is measured by a novel metric called backdoor existence coefficient. It implies that the backdoors just lie dormant rather than being eliminated. To further verify this finding, we empirically show that these dormant backdoors can be easily re-activated during inference stage, by manipulating the original trigger with well-designed tiny perturbation using universal adversarial attack.
ProAPT: Projection of APT Threats with Deep Reinforcement Learning
Dehghan, Motahareh, Sadeghiyan, Babak, Khosravian, Erfan, Moghaddam, Alireza Sedighi, Nooshi, Farshid
The highest level in the Endsley situation awareness model is called projection when the status of elements in the environment in the near future is predicted. In cybersecurity situation awareness, the projection for an Advanced Persistent Threat (APT) requires predicting the next step of the APT. The threats are constantly changing and becoming more complex. As supervised and unsupervised learning methods require APT datasets for projecting the next step of APTs, they are unable to identify unknown APT threats. In reinforcement learning methods, the agent interacts with the environment, and so it might project the next step of known and unknown APTs. So far, reinforcement learning has not been used to project the next step for APTs. In reinforcement learning, the agent uses the previous states and actions to approximate the best action of the current state. When the number of states and actions is abundant, the agent employs a neural network which is called deep learning to approximate the best action of each state. In this paper, we present a deep reinforcement learning system to project the next step of APTs. As there exists some relation between attack steps, we employ the Long- Short-Term Memory (LSTM) method to approximate the best action of each state. In our proposed system, based on the current situation, we project the next steps of APT threats.
- Asia > Middle East > Iran > Tehran Province > Tehran (0.04)
- North America > United States > New York > New York County > New York City (0.04)
- North America > United States > New Mexico > Bernalillo County > Albuquerque (0.04)
- (2 more...)
- Research Report (0.50)
- Workflow (0.46)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.90)
- Information Technology > Artificial Intelligence > Machine Learning > Reinforcement Learning (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Learning Graphical Models > Undirected Networks > Markov Models (0.69)
- Information Technology > Artificial Intelligence > Machine Learning > Learning Graphical Models > Directed Networks > Bayesian Learning (0.46)
Pinaki Laskar on LinkedIn: #MachineLearning #ML #Security
What is Mobile Machine Learning and How do you deploy #MachineLearning on mobile devices? Mobile #ML, A mobile app intelligent to modify itself according to user's needs without your control, analyze big sets of different information (text, visual, audio, biometric) in order to make decisions, can tailor your app according to personal needs of every single user. How Are Developers Using Machine Learning for Mobile Apps? - For Filtering and #Security - For #ArtificialIntelligence - For Predictive #Analytics ML & Mobile - Deploying Models on The Edge, Virtually all cutting edge technologies can benefit from it, - Improve unsupervised #algorithms - Enhance personalization - Increase adoption of #quantumcomputing - Improve #cognitive services - Rise of #robots Strategic Implications of ML and Mobile, Training #Data - Data which has been tagged, categorized, or otherwise sorted by humans. Software - The #software library which builds the machine learning models by evaluating training data. Hardware: The CPUs and GPUs which run the software's calculations.
Home
We are very excited to be hosting the world renown Tamara McCleary, international technology futurist, emerging technology guru, sci-fi writer, marketing digital strategy consultant and Thulium CEO. Tamara is ranked in the Worlds Top 5 in Artificial Intelligence, Robotics and Internet of Things (IoT), the WorldsTop 15 Machine to Machine (M2M), the Worlds Top 50 Blockchain, Digital Transformation and Big Data. Tamara is rank in the Top 1% of Global Social Media Influencers (Klear) and listed as one of the Top 50 Social Influencers of 2015, 2016, 2017 (Onalytica). Tamara was named Number 1 Most Influential Woman in MarTech (B2B Marketing) and ranked the 2nd most mentioned person on Twitter by Chief Marketing Officers (LeadTail). Tamara is an IBM Futurist and creator of the trademarked RelationShift method.
Former Michigan CISO: Don't Ignore Security Predictions
It seems like every vendor in the data security industry makes predictions this time of year. Which ones should you pay attention to? All of them, says Dan Lohrmann, who formerly served as the state of Michigan's CISO and CTO. See Also: IoT is Happening Now: Are You Prepared? "I really view it as something that professionals need to widen their perspectives," Lohrmann says in an interview with Information Security Media Group.
How AI can help you stay ahead of cybersecurity threats
Since the 2013 Target breach, it's been clear that companies need to respond better to security alerts even as volumes have gone up. With this year's fast-spreading ransomware attacks and ever-tightening compliance requirements, response must be much faster. Adding staff is tough with the cybersecurity hiring crunch, so companies are turning to machine learning and artificial intelligence (AI) to automate tasks and better detect bad behavior. In a cybersecurity context, AI is software that perceives its environment well enough to identify events and take action against a predefined purpose. AI is particularly good at recognizing patterns and anomalies within them, which makes it an excellent tool to detect threats.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
How AI is transforming the future of fintech
WIRED Money takes place in Studio Spaces, London on May 18, 2017. For more details and to purchase your ticket visit wiredevent.co.uk "Breaking: Two Explosions in the White House and Barack Obama is injured." At the time of the tweet, AP's account had around two million followers. The post was favourited, retweeted, and spread. At 13:13, AP confirmed the tweet was fake.
- Information Technology (1.00)
- Banking & Finance (1.00)
- Government > Regional Government > North America Government > US Government (0.55)
- Information Technology > Communications > Mobile (0.48)
- Information Technology > Artificial Intelligence > Issues > Social Issues (0.40)
- Information Technology > Communications > Social Media (0.35)
How to use machine learning and AI in cyber security
Cyber criminals are constantly seeking new ways to perpetrate a breach but thanks to artificial intelligence (AI) and its subset machine learning, it's becoming possible to fight off these attacks automatically. The secret is in machine learning's ability to monitor network traffic and learn what's normal within a system, using this information to flag up any suspicious activity. As the technology's name suggests, it's able to use the vast amounts of security data collected by businesses every day to become more effective over time. At the moment, when the machine spots an anomaly, it sends an alert to a human – usually a security analyst – to decide if an action needs to be taken. But some machine learning systems are already able to respond themselves, by restricting access for certain users, for example.