What can be detected?
detection mechanisms
intrusion detection prevention system IDS IPS
Firewalls:
IT based detection mechanism
Security information and event management SIEM
Trap and trace systems
Anti-malware software (essentially IDS and SIEM)
AI
anything that can be viewed as perceiving its environment through sensors and acting upon that environment through actuators
Intelligent behavior is based on an agent function that connects data inputs with actions executed by the agent
the agent function can be realized using different technical approaches (e.g. static sets of human defined rules, patterns derived from data through algorithms)
Machine Learning
learning from experience with algorithms that are trained on data to create models that capture patterns in the data
SL: an algorithm is trained based on input and corresponding output data to learn a function that matches a given input and output to predict outputs for new inputs ( detection of spam e-mail)
UL: based on input data only, an algorithm detects patterns in the data such as groups or cluster that show some kind of similarity (detection of network anomalies)
AI-based Detection
Spam e-mail identification based on supervised learning
Intrusion detection based on UL
Issues with AI -based detection
Quality of training data determines result quality