Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from Nullcon Goa 2018 that delves into the intriguing dynamics between adversaries and AI scientists in cybersecurity. Discover how game theory and artificial intelligence can be applied to information security, creating a realistic simulation of attacker-defender interactions. Learn about the challenges of designing such games, the role of AI-powered tools in observing adversary actions, and various tactics and techniques employed by both sides. Gain insights into topics like visibility, deception, DNS tunneling attacks, and detection methods. Examine real-world scenarios, data pipelines, and the application of game theory in cybersecurity. Conclude with a discussion on open problems, future visions, and the comparison between AI and human intelligence in this critical field.
Syllabus
Introduction
Who am I
Gameplan
Problem
The Adversary
The Defender
The Game
Tactics and Techniques
Visibility
Deception
Adversary
Demo
Scenario
What Adversary does
Attack Scenario
Adversary Attack
Defender Attack
DNS Tunnel
DNS Tunnel Attack
Detect DNS Tunnel Attack
Combination of Deception AI
Use Cases
Data Pipeline
Tactic and Technique
Definition of a Game
The Game Theory
Alphago
Open Problems
Futuristic Vision
Questions
AI vs Human Intelligence
Taught by
nullcon