machine learning methods for personalized cybersecurity jaime g. carbonell eugene fink mehrbod...

9
Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence to adapt cybersecurity tools to the needs of (naïve) individual users.

Post on 20-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence

Machine Learning Methods for

Personalized CybersecurityJaime G.Carbonell

EugeneFink

MehrbodSharifiApplying machine learning and

artificial intelligence to adapt

cybersecurity tools to the needs

of (naïve) individual users.

Page 2: Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence

Individual user differences• Security needs

- Data confidentiality- Data-loss tolerance- Recovery costs

• Usage patterns• Computer knowledge

Different users need different security tools.

Page 3: Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence

Problem

• Inflexible engineered solutionswith “too much security”- Too high security at high costs- Insufficient customization options

• “Advanced user” assumption- Complicated customization- Unclear security warnings

Page 4: Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence

Examples

Typical response of naïve users:• Always no (too much security)• Always yes (not enough security)• Ask a techie if available

Page 5: Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence

Population statisticsComputer use byage and gender

User naïveté correctanswers

Page 6: Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence

Population statistics• Almost everyone uses a computer• Most users are naïve, with very

limited technical knowledge• Many security problems are

due to the user naïveté

When an average user deals with security issues, she often needs basic advice and handholding.

Page 7: Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence

Long-term goal

We need an automated security

assistant that learns the needs

of the individual user and helps

the user to apply security tools.

Page 8: Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence

Research problems• Learning about the user

- Usage patterns- Technical knowledge- Security choices

• Elicitation of security needs- Understandable questions- Optimized question selection- Conversion of the elicited answers to appropriate security settings

• Understandable warnings- Not-Sure response option- Explanation customized to the user technical knowledge- Advice customized to the user needs- Optimization of yes/no decisions

• Learning across multiple users- Learning from observations- Integration of expert advice- Distributed processing of massive data

Page 9: Machine Learning Methods for Personalized Cybersecurity Jaime G. Carbonell Eugene Fink Mehrbod Sharifi Applying machine learning and artificial intelligence

Architecture

ModelConst-ruction

ModelEvalu-ation

QuestionSelection

SecurityDecision

Optimizer

currentmodel

modelutility andlimitations

questionsanswers andobservations

Top-Level Control

DataCollection