1 / 9

Machine Learning Methods for Personalized Cybersecurity

Jaime G. Carbonell. Mehrbod Sharifi. Eugene Fink. Machine Learning Methods for Personalized Cybersecurity. Applying machine learning and artificial intelligence to adapt cybersecurity tools to the needs of (naïve) individual users. Individual user differences.

mbedard
Download Presentation

Machine Learning Methods for Personalized Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Jaime G.Carbonell MehrbodSharifi EugeneFink Machine Learning Methods forPersonalized Cybersecurity Applying machine learning and artificial intelligence to adapt cybersecurity tools to the needs of (naïve) individual users.

  2. Individual user differences • Security needs- Data confidentiality- Data-loss tolerance- Recovery costs • Usage patterns • Computer knowledge Different users need different security tools.

  3. Problem • Inflexible engineered solutionswith “too much security”- Too high security at high costs- Insufficient customization options REIGN OF CONFUSION • “Advanced user” assumption- Complicated customization- Unclear security warnings

  4. Typical response of naïve users: • Always no (too much security) • Always yes (not enough security) • Ask a techie if available Examples

  5. User naïveté correctanswers Population statistics Computer use byage and gender

  6. Population statistics • Almost everyone uses a computer • Most users are naïve, with very limited technical knowledge • Many security problems aredue to the user naïveté When an average user deals with security issues, she often needs basic advice and handholding.

  7. Long-term goal We need an automated security assistant that learns the needs of the individual user and helps the user to apply security tools. MACHINE LEARNING TO THE RESCUE

  8. Research problems • Learning about the user- Usage patterns- Technical knowledge- Security choices • Elicitation of security needs- Understandable questions- Optimized question selection- Conversion of the elicited answers to appropriate security settings • Understandable warnings- Not-Sure response option- Explanation customized to the user technical knowledge- Advice customized to the user needs- Optimization of yes/no decisions • Learning across multiple users- Learning from observations- Integration of expert advice- Distributed processing of massive data

  9. Architecture Top-Level Control modelutility andlimitations ModelConst-ruction QuestionSelection ModelEvalu-ation currentmodel SecurityDecision Optimizer answers andobservations questions DataCollection

More Related