identifying changes in the cybersecurity threat landscape
play

Identifying Changes in the Cybersecurity Threat Landscape using the - PowerPoint PPT Presentation

Identifying Changes in the Cybersecurity Threat Landscape using the LDA-Web Topic Modelling Data Search Engine Thursday 13 th July 2017 Multidisciplinary approaches to Cloud Crime HCII 2017, Vancouver Canada Noura Al Moubayed, David Wall, and


  1. Identifying Changes in the Cybersecurity Threat Landscape using the LDA-Web Topic Modelling Data Search Engine Thursday 13 th July 2017 Multidisciplinary approaches to Cloud Crime HCII 2017, Vancouver Canada Noura Al Moubayed, David Wall, and A. Stephen McGough

  2. Outline • The Problem • Text Processing for Topic Modelling • Using Topic Modelling for searching

  3. The Problem • “90% of all the data in the world has been generated over the last two years”… IBM • “85% of worldwide data is held in un-structured formats”… Berry and Kogan • How can we understand it? ….or better still make use of it? • How can we determine the most pertinent information? …and then act on it? • How can we find the needle if we are not sure what it looks like or what hay looks like? • "Without labelling, you cannot train a machine with a new task”… IBM

  4. Outline • The Problem • Text Processing for Topic Modelling • Using Topic Modelling for searching

  5. Topic Modelling: Latent Dirichlet Allocation (LDA) Topics Select words from topics Select topics US Govt Data Shows Russia This report presents a proof of concept of our approach to solve anomaly detection problems using unsupervised deep learning. The work focuses on two specific models namely deep restricted Boltzmann machines and stacked denoising autoencoders. The approach is tested on two Used Outdated Ukrainian PHP datasets: VAST Newsfeed Data and the Commission for Energy Regulation smart meter project dataset with text data and numeric data respectively. Topic modeling is used for features extraction from textual data. The results show high correlation between the output of the two modeling techniques. The outliers in energy data Malware detected by the deep learning model show a clear pattern over the period of recorded data demonstrating the potential of this approach in anomaly detection within big data problems where there is little or no prior Topics knowledge or labels. These results show the potential of using unsupervised deep learning methods to address anomaly detection problems. For example it could be used to detect suspicious money transactions and help with detection of terrorist funding activities or it could also be applied to the detection of potential criminal or terrorist activity using phone or digitil). The United States government earlier this year officially accused Russia of interfering with the US elections. Earlier this year on October 7th, the Department of Homeland Security and the Office of the Director of National Intelligence

  6. Outline • The Problem • Text Processing for Topic Modelling • Using Topic Modelling for searching

  7. Demo – Topic Modelling

  8. Potential Applications: • Other • Security Applications: • Student applications • Terrorist activity tracking • Identifying bogus attempts for visa • Acting out of character, predicting activity • Social Media tracking • Police crime database • Social grooming, political persuasion, • Criminal profiling, acting out of character product complaints • Unwanted information release • Fake News identification and • Topic changes, specific damaging subjects tracking • Sentiment tracking …..Your use-case here stephen.mcgough@newcastle.ac.uk We Are recruiting: - 1 PostDoc (Machine Learning / NLP) noura.al-moubayed@dur.ac.uk - 1 PostDoc (Parallel Programming) D.S.Wall@leeds.ac.uk - Always looking for good PhD Candidates

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend