Overview
Explore an introduction to security in deep learning, focusing on intrusion detection systems (IDS) and common machine learning pitfalls. Delve into the complexities of security data, the FASTT system, and issues of target leakage. Examine real-world examples like the "dog or muffin" problem, stop sign recognition, and wolf vs. husky classification to understand the challenges in training data and the importance of distinguishing correlation from causation. Learn about the KDD-99 dataset and malware classification as a complex security application. Discover techniques to prevent overfitting and gain insights into hardware considerations for deep learning in security contexts.
Syllabus
Intro
Intrusion Detection Systems (IDS)
Security Data are Complex
The FASTT System
More Target Leakage
Dog or Muffin?
Stop Sign?
Wolf or Husky? - Training Data
Correlation vs Causation
This Might Be Believable
KDD-99 Dataset
Malware Classification: A Relatively Complex Security Application
Malware File Format
Winning Entry
Technique Overview ("NO to overfitting!")
Hardware Used
Taught by
Jeff Heaton