Overview
Explore the intersection of deep learning and information security in this 50-minute conference talk from NULLCON Goa 2020. Delve into the reality of leveraging deep learning to combat cyber threats, moving beyond the hype. Discover practical use cases, data pipelines, algorithms, and code examples for applying machine learning and deep learning in InfoSec. Gain insights into the challenges of deploying these technologies in real-world scenarios. Learn about various security data sources, including network logs, endpoint logs, and authentication logs. Examine techniques such as anomaly detection, malware detection using feed-forward neural networks, and command and control detection with recurrent neural networks. Understand the potential of adversarial machine learning in cybersecurity applications. Benefit from the expertise of Dr. Satnam Singh, a leading security data science professional with extensive experience in building data products and numerous patents and publications in the field.
Syllabus
Intro
It is all about Money !!
Information Security Problem
Basic Security Controls
Security Data Sources: Network Logs
Endpoint Logs and Use Cases
Authentication Logs and Use Cases
Step 2: Compute Statistics
Step 3: Anomaly Detection
Example 2: Malware Detection
Feed Forward Neural Network
Command and Control Detection
Recurrent Neural Network
Adversarial ML Use-cases
Taught by
nullcon