Overview
Syllabus
Intro
whoami
Security Singularity Approaches
Guess the Year!
A little history
Three Letter Acronyms - KDD
Trolling, maybe?
Not here to bash academia
A Probable Outcome
ML Marketing Patterns
Anomaly Detection
AD: Curse of Dimensionality
A practical example
A MORE practical example
Breaking the Curse
AD: Normality-poisoning attacks
AD: Hanlon's Razor
What about User Behavior?
Classification!
Lots of Malware Activity
Everyone makes mistakes!
What about the Ground Truth?
But what about data tampering?
And what about false positives?
Buyer's Guide
MLSec Project
Taught by
Black Hat