AISec 2017 Workshop: Modern Artificial Intelligence (AI) and Natural Language Processing (NLP) Techniques for Cyber Security

 
Saturday October 28, 2017
Centre for Excellence in Computational Engineering and Networking (CEN),
Amrita Vishwa Vidyapeetham.


About Phase I of AISec 2017 Workshop series

The AISec (Artificial Intelligence for Cyber Security) group in the Computational Engineering and Networking (CEN) department at Amrita Vishwa Vidyapeetham is organizing a one-day workshop on 28th October, 2017. The workshop will cover Deep learning applications in the field of Cyber Security including NLP. The main aim of this workshop is to share the ideas of on-going research and exploratory topics, leading to possible collaborations between CEN faculty, Ph.D research scholars and students.

This is the era of data driven science. So to make sense of data is highly sought after skill in today's massively connected data driven world. Machine learning brought a breakthrough in achieving this. Deep learning which is a subset of traditional AI and Machine learning techniques is the cutting edge technology in the current scenario. These set of techniques provides a platform for advanced decision making for complex problems. However these techniques are still in the Faraday stage in the field of Cyber Security. In turn it's probably most helpful to think of deep learning as the cutting edge of cutting edge. As the size of data grows larger, deep learning play a key role in extracting knowledge, situational awareness, and security intelligence from Big Data. In order to take journey through deep learning to Big Data analytics, this workshop will help to initiate conversations.

The primary target audience of the workshop is BTech final year students, Mtech/M.Sc students, research scholars and faculty. We hope to have an interactive session, with a free exchange of ideas, views and comments. Please fill all the required details during registration. For more queries, please contact vinayakumarr77[at]gmail.com, harikrishnannb07[at]]gmail.com

About AISec

AISec group at CEN understand the underlying mathematics knowledge required to apply Machine learning to Cyber Security tasks at Scale.

The ability to digitize our lives has outpaced our ability to stay safe. One of the biggest challenges is to understand the volume, velocity and complexity of threatening activity inside the network. We call this cyber intelligence. We have been developing a self-learning intelligence system by understanding the mathematics and using the most advanced machine learning technologies such as deep learning. A self-learning intelligence system learns a unique pattern of normal and abnormal activities of every device and user on a network, and correlates these insights in order to spot emerging threats that would otherwise go unnoticed. AISec group is fortunate to have Cyber Security experts and Researchers who have constantly smell the developments in Natural language processing, Image processing, Speech recognition and many other areas and incorporate those novel approaches to self-learning system to enhance the system detection rate of malicious activities. We are involved in developing large scale Security projects that involves Big-data Security Intelligence, Cyber-Physical systems security, Machine learning for Security, Complex Binary analysis, IoT, SCADA and Hardware security, Application & Network security, Advanced Forensics and Incident handling. Some of the tasks that we think and solve daily are to apply various Data mining, Machine learning and Deep learning approaches to various Cyber Security tasks such as Traffic Analysis, Intrusion detection, Malware Analysis, Botnet Analysis, Anonymity Services, Domain Generation Algorithms, Advanced mathematics to Crypto Systems.


Academics at CEN

Program

Venue: CEN class room

09:30 - 11:15   Session 1: Basics of Optimization theory for Neural Networks

Presenter: Soman K. P.

Neural Networks (NNs) are one of the bedrock model on the area of Machine Learning and Artificial Intelligence. A numerical optimization problem appears when NNs are applied for solving Machine Learning problems, which consists in minimizing a non-convex function in a multidimensional space. Several algorithms based on the first order derivative (gradient type algorithms) of this non-convex function have been successfully applied for training Feedforward NNs (FNNs).

We begin with mathematical foundations of Neural networks. Convex and Non Convex Optimization - key theoretical principles, algorithms and applications will be discussed next. The Gradient Descent algorithm will be addressed. We culminate with the fascinating field of Machine Learning and Deep Learning- discussing key ideas and practical applications. A brief tour of the basics of Linear Algebra and Optimization will be covered as a part of the tutorial.

There has been a burst of recent research activity in all these areas. This workshop brings researchers from these vastly different domains and hopes to create a dialogue among them. In addition to the theoretical frameworks, the workshop will also feature practitioners, especially in the area of deep learning who are developing new methodologies for training large scale neural networks. The result will be a cross fertilization of ideas from diverse areas and school of thought.

11:15 - 11:30   Coffee Break

11:30 - 01:00   Session 2: Security Analytics: Big Data Analytics for Cyber Security

Presenter: Vijay Krishna Menon

01:00 - 02:00   Lunch

02:00 - 03:00   Session 3: AI (Data mining, Machine learning and Deep learning) techniques for CyberSecurity Use cases
03:00 - 08:00   Session 3.1: Hands-on Session

Presenter: Vinayakumar R (Research Scholar) and Harikrishnan N B (MTech-CEN)

Intrusion detection Frameworks: TensorFlow, Theano, Keras, Scikit-learn


Programming languages : Java and Python


Packages: Numpy, Scipy, Pandas, Matplotlib, t-SNE, NLTK
Traffic Analysis
Android Malware Detection
Malicious URL Detection
Domain Name Generation Algorithms Analysis
Network Traffic Prediction
Ransomware Detection
Encrypted Text Categorization
Operation Log Anomaly Detection
E-mail Spam Filtering



Registration is closed



Books published from CEN on Signal processing and Machine learning
  1. Dr. K.P. Soman, Prabaharan Poornachandran, Sachin Kumar S and Neethu Mohan, "Convex Optimization based Signal Processing for IOT." [Upcoming Book]

  2. Dr. K.P. Soman and Dr. Ramachandran K.I, "Insight into Wavelets From Theory to Practice.", Prentice-Hall India 2004.

  3. Dr. K.P. Soman, Shyam Diwakar, Ajay V., "Insight into Data Mining From Theory to Practice.", Prentice-Hall India, 2006.

  4. Dr. K.P. Soman, Ajay. V, Loganathan R., "Machine Learning with SVM and other Kernel Methods.",Prentice-Hall India, 2009.

  5. Dr. K.P.Soman, and Ramanthan, "Digital signal and Image Processing-The Sparse Way." Elsevier Publications, 2012.

  6. Dr. Deepa G., Dr. Krishnan Namboodiri, "Bioinformatics: Sequential and Structural Analysis.", Narosa Publications.

  7. Dr. K.I Ramachandran., Dr. Deepa, Dr. Krishnan Namboori, "Computational Chemistry and Molecular Modelling." -Springer international.

  8. "Fractals for Everyone." Online version: http://cen.amritafoss.org/downloads/ (link is external) Manu Unni, Praveen Krishnan, Dr. K. P. Soman.
Text books

List of recent papers published from CEN on Deep learning based CyberSecurity
  1. Book chapter

    • "Scalable Framework for Cyber Threat Situational Awareness based on Domain Name Systems Data Analysis." will appear in Big data in Engineering Applications (Springer). [under print]

  2. Journals

    • "Detecting Android Malware using Long Short-term Memory-LSTM." will appear in Journal of Intelligent and Fuzzy Systems - IOS Press. [under print]

    • "Evaluating Deep Learning Approaches to Characterize and Classify the DGAs at Scale." will appear in Journal of Intelligent and Fuzzy Systems - IOS Press. [under print]

    • "Evaluating Deep learning Approaches to Characterize, Signalize and Classify malicious URLs." will appear in Journal of Intelligent and Fuzzy Systems - IOS Press. [under print]

    • "Detecting Malicious Domain Names using Deep Learning Approaches at Scale." will appear in Journal of Intelligent and Fuzzy Systems - IOS Press. [under print]

  3. Springer proceedings

    • "Prediction of Malicious Domains Using Smith Waterman Algorithm." [paper]

    • "Fast Fourier Transform and Nonlinear Circuits Based Approach for Smart Meter Data Security." [paper]

    • "Deep Learning for Network Flow Analysis and Malware Classification." will appear in Springer CCIS. [under print]

  4. Conference papers

    • "Evaluating Shallow and Deep networks for SSH Traffic Analysis using Flow based mechanisms." will appear in IEEE Xplore. [under print]

    • "Evaluating Effectiveness of Shallow and Deep Networks to Intrusion Detection System." will appear in IEEE Xplore. [under print]

    • "Deep Android Malware Detection and Classification." will appear in IEEE Xplore. [under print]

    • "Long Short-Term Memory based Operation Log Anomaly Detection." will appear in IEEE Xplore. [under print]

    • "Deep Encrypted Text Categorization." will appear in IEEE Xplore. [under print]

    • "Applying Convolutional Neural Network for Network Intrusion Detection." will appear in IEEE Xplore. [under print]

    • "Secure Shell (SSH) Traffic Analysis with Flow based Features Using Shallow and Deep networks." will appear in IEEE Xplore. [under print]

    • "Applying Deep Learning Approaches for Network Traffic Prediction." will appear in IEEE Xplore. [under print]

    • "Evaluating Shallow and Deep Networks for Ransomware Detection and Classification." will appear in IEEE Xplore. [under print]


Developed by Vinayakumar R and Harikrishnan N B