Cargando…

Secure because math? : challenges on applying machine learning to security /

"Large-scale machine learning, be it supervised or unsupervised, has become an important cornerstone of the information systems we use today. It is only natural that it would become a hot topic in Information Security as well, and a large number of security startups have appeared claiming mirac...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Pinto, Alex (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Descripción
Sumario:"Large-scale machine learning, be it supervised or unsupervised, has become an important cornerstone of the information systems we use today. It is only natural that it would become a hot topic in Information Security as well, and a large number of security startups have appeared claiming miracles due to their experience with big data technologies even without previous experience in the Information Security field. It turns out not all algorithms and techniques are born equal, and protecting networks and endpoints from attackers is a very different problem then recommendation engines and automated ad bidding. Not to speak of the potentially disastrous results if techniques are applied incorrectly or with a bad sensitivity/specificity calibration.This presentation will describe how information security is a different problem and the challenges intrinsic to this specific field that many first entrants seem to ignore. We will discuss strengths and caveats of unsupervised and supervised models in this scenario and where they have historically been applied in different segments of InfoSec. It will provide all the background in Information Security you may need to enjoy it, and will shed some light on burning questions about "why isn't this all secure with deep learning already?" and "if I can decide to bid on an ad in milliseconds, why can't I use this tech to block an attacker?."--Resource description page.
Notas:Title from title screen (viewed January 28, 2016).
Descripción Física:1 online resource (1 streaming video file (1 hr., 24 sec.)) : digital, sound, color