Now That You Have a Machine Learning Model, It’s Time to Evaluate Your Security Classifier

Now that you’ve identified an AI solution and selected a suitable algorithm for your machine learning model, you’re ready to measure the effectiveness of your security classifier.

The post Now That You Have a Machine Learning Model, It’s Time to Evaluate Your Security Classifier appeared first on Security Intelligence.

Continue reading Now That You Have a Machine Learning Model, It’s Time to Evaluate Your Security Classifier

Generative Adversarial Networks and Cybersecurity: Part 2

Researchers have shown how generative adversarial networks (GANs) can be applied to cybersecurity tasks such as cracking passwords and identifying hidden data in high-quality images.

The post Generative Adversarial Networks and Cybersecurity: Part 2 appeared first on Security Intelligence.

Continue reading Generative Adversarial Networks and Cybersecurity: Part 2

Generative Adversarial Networks and Cybersecurity: Part 1

Generative adversarial networks are neural networks that compete in a game in which a generator attempts to fool a discriminator with examples that look similar to a training set.

The post Generative Adversarial Networks and Cybersecurity: Part 1 appeared first on Security Intelligence.

Continue reading Generative Adversarial Networks and Cybersecurity: Part 1

With AI2, Machine Learning and Analysts Come Together to Impress, Part 3: The Experiment

Two researchers performed an experiment based on billions of log lines that demonstrated the importance of domain expertise in machine learning analysis.

The post With AI2, Machine Learning and Analysts Come Together to Impress, Part 3: The Experiment appeared first on Security Intelligence.

Continue reading With AI2, Machine Learning and Analysts Come Together to Impress, Part 3: The Experiment

With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms

AI2 uses an “analyst-in-the-loop” system to improve itself and a “human-in-the-loop” system to create examples to be used in iterative training algorithms.

The post With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms appeared first on Security Intelligence.

Continue reading With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms

With AI2, Machine Learning and Analysts Come Together to Impress, Part 1: An Introduction

Machine learning systems like A12 are designed to augment human analysis with cognitive intelligence, enabling IT professionals to reduce false positives.

The post With AI2, Machine Learning and Analysts Come Together to Impress, Part 1: An Introduction appeared first on Security Intelligence.

Continue reading With AI2, Machine Learning and Analysts Come Together to Impress, Part 1: An Introduction