[DSC MENA 24] Ramy_Agieb_-_Advancements_in_Artificial_Intelligence_for_Cybersecurity-Ramy_Agieb_19-4-V1.pptx

DataScienceConferenc1 27 views 42 slides Apr 27, 2024
Slide 1
Slide 1 of 42
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42

About This Presentation

With the continuous growth of the digital environment, the risks in the online realm also increase. This calls for strong security measures to safeguard valuable information and essential systems. Artificial Intelligence (AI) has become a powerful weapon in the fight against cyber threats. This talk...


Slide Content

2 ?????????????????????? From “Wireless Communications” Edfors, Molisch, Tufvesson d Advancements in Artificial Intelligence for Cybersecurity

3 From “Wireless Communications” Edfors, Molisch, Tufvesson d Hackers using AI tools

4 WormGPT From “Wireless Communications” Edfors, Molisch, Tufvesson d A new generative AI cybercrime tool Underground forums as a perfect tool for adversaries to launch sophisticated phishing campaigns and business email compromise (BEC) attacks . BEC cost 1.8 billion in 2020 For Learning only

5 TorGpt From “Wireless Communications” Edfors, Molisch, Tufvesson d For Learning only

6 ????????

7 Artificial Intelligence From “Wireless Communications” Edfors, Molisch, Tufvesson “Can a machine think and behave like humans do?” According to the father of Artificial Intelligence John McCarthy , it is “ The science and engineering of making intelligent machines , especially intelligent computer programs”.

8 Agenda d

9 Agenda d

10 Artificial Intelligence From “Wireless Communications” Edfors, Molisch, Tufvesson d

11 AI & ML & DL & FM From “Wireless Communications” Edfors, Molisch, Tufvesson d AI is the broader concept of creating intelligent machines . ML is a subset of AI focusing on learning from data . DL is a subset of ML employing deep neural networks for learning and modeling complex patterns . FM Generative AI , any model that is trained on broad data (generally using self-supervision at scale )

12 AI & ML & DL & FM From “Wireless Communications” Edfors, Molisch, Tufvesson d

13 AI Initialization From “Wireless Communications” Edfors, Molisch, Tufvesson d AI Initialization

14 M easure the Performance d Confusion Matrix Popular evaluation metric used to describe the performance of a classification model (or "classifier"). FP: lead to unnecessary alerts and operational., consuming valuable resources and causing alert fatigue FN: can result in undetected security breaches .

15 AI & ML & DL From “Wireless Communications” Edfors, Molisch, Tufvesson d Handle False Positives False Negative

16 Agenda d

17 Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d Cybersecurity is the practice of protecting smart divices like Mobile, computer systems, networks, and data from unauthorized access, attacks, damage, or theft .

18 Core Principles of Cybersecurity Confidentiality : Ensuring that sensitive information is only accessible to authorized individuals or systems. Integrity : Protecting data and information from being altered without authorization . Availability : Ensuring that systems and data are available and accessible when needed. CIA

19 Agenda d

20 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d AI providing new ways to detect and prevent cyber threats in real time, and digital forensics. Set of challenges, including issues of data privacy, false positives, and the need for constant updates and adaptations.

21 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d Some key features of AI technology in cybersecurity include: Real-time monitoring: AI continuously monitor network sand systems for suspicious activity, identifying and reacting to potential threats in real time. Behavior analytics: AI analyze user behavior and detect anomalies that may indicate a security breach or attempted attack. Anomaly detection: AI can identify patterns that may indicate a cyberattack , even in cases where the attack may not fit a predefined threat profile .

22 AI & Cybersecurity d Real-time monitoring Behavior analytics Anomaly detection

23 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d

24 Alogorithmes of A I in Cybersecurity d Fully Homomorphic Encryption (FHE) Long Short-Term Memory (LSTM) Networks Variational Autoencoders (VAEs) Natural Language Processing (NLP) Models Graph Neural Networks (GNNs)

25 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d

26 Alogorithmes of A I in Cybersecurity d Merkle Trees Secure Multi-Party Computation (SMPC) Differential Privacy Zero-Knowledge Proofs (ZKPs) Integrity

27 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d

28 Alogorithmes of A I in Cybersecurity d Recurrent Neural Networks (RNNs ) Availability Long Short-Term Memory (LSTM) networks Isolation Forests Q-Learning Streaming Analytics Generative Adversarial Networks (GANs)

29 Alogorithmes of A I in Cybersecurity d detect Deepfake Facial Landmark Detection XceptionNet FaceForensics ++ Voice Biometrics Fusion of Multiple Modalities

30 AI & Cybersecurity Python Libraries From “Wireless Communications” Edfors, Molisch, Tufvesson d

31 AI & Cybersecurity Python Libraries From “Wireless Communications” Edfors, Molisch, Tufvesson d

32 Agenda d

33 AI & Cybersecurity Tools d Top Tools Intrusion Detection Network Traffic Analysis Malware Analysis Data Preprocessing WEKA Waikato Environment for Knowledge Analysis : open-source software package with a wide range of tools and algorithms for data preprocessing , machine learning , and data mining tasks Log Analysis Threat Intelligence Analysis

34 AI & Cybersecurity Tools From “Wireless Communications” Edfors, Molisch, Tufvesson d Top Tools AI platform designed for advanced cybersecurity and penetration testing applications Threat Detection and Prevention Vulnerability Assessment Custom AI Solutions Incident Response

35 AI & Cybersecurity Tools From “Wireless Communications” Edfors, Molisch, Tufvesson d Top Tools

36 AI & Cybersecurity Tools using by HACKERS From “Wireless Communications” Edfors, Molisch, Tufvesson d

37 Agenda d

38 AI & Cybersecurity From “Wireless Communications” Edfors, Molisch, Tufvesson d Ethical Considerations in AI-Cybersecurity Integration Bias: The data used to train AI models is representative , diverse , and unbiased . Transparency: Ensuring that AI systems are explainable and understandable can help prevent suspicion and mistrust. Accountability: It is important to clearly define who is responsible for errors or misuse of AI technology.

39 AI & Cybersecurity d The Role of Government Agencies In the United States , the Department of Home land Security (DHS) Science and Technology Directorate has launched several initiatives aimed at improving cybersecurity through AI . These initiatives include cybersecurity research and development , technology testing and evaluation , and technology transition and commercialization.

40 AI & Cybersecurity d The Role of Government Agencies National Institute of Standards and Technology ( NIST ) developed a frame work for improving critical infrastructure cybersecurity. National Security Agency ( NSA ) has created a Cybersecurity Directorate to enhance the agency’s cyber defense capabilities. Academic institutions are conducting cutting-edge research in the field of AI and cybersecurity.

41 From “Wireless Communications” Edfors, Molisch, Tufvesson d AI technology is playing a critical role in safeguarding sensitive information from data breaches, theft, and manipulation .

42 From “Wireless Communications” Edfors, Molisch, Tufvesson d
Tags