Transfer Learning - Repurposing ML Algorithms from Different Domains to Cloud Defense

Transfer Learning - Repurposing ML Algorithms from Different Domains to Cloud Defense

RSA Conference via YouTube Direct link

Neural Fuzzing Core Concept: Transposing existing security problem into an already solved problem from another domain

21 of 29

21 of 29

Neural Fuzzing Core Concept: Transposing existing security problem into an already solved problem from another domain

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Transfer Learning - Repurposing ML Algorithms from Different Domains to Cloud Defense

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Leveraging intelligence across product lines
  3. 3 Microsoft's cloud security scale - Daily numbers
  4. 4 Textbook ML development
  5. 5 Traditional versus Transfer learning
  6. 6 Why transfer learning
  7. 7 Detecting malicious network activity in Azure Core Concept: Achieve transfer leaming by grouping similar tasks
  8. 8 Ensemble Tree Learning applications at Microsoft
  9. 9 Input data
  10. 10 Tree Ensembles - Algorithm
  11. 11 Tree Ensembles - Training
  12. 12 Tree Ensembles - Testing
  13. 13 Model performance and productization Model trained at regular intervals
  14. 14 Bonus Classifier can be used as an effective canary for emerging attacks
  15. 15 WannaCry Attack Timeline
  16. 16 Detecting Malicious PowerShell commands Core Concept: Transposing existing security problem into an already solved problem from another domain
  17. 17 PowerShell command lines - difficult to detect
  18. 18 Microsoft's Deep Learning toolkit (CNTK) applications
  19. 19 Deeper learning = representation learning
  20. 20 Technique overview
  21. 21 Neural Fuzzing Core Concept: Transposing existing security problem into an already solved problem from another domain
  22. 22 Seq2Seq Neural Architecture
  23. 23 Improved fuzzing intuition
  24. 24 readelf dataset example
  25. 25 Example readelf 2.28 model
  26. 26 Analysis by GDB exploitable plugin Target: Linux readelf 2.28
  27. 27 Readelf model performance over 48h and productization
  28. 28 Conclusion
  29. 29 Resources

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.