Intelligent Tech Channels Issue 16 - Page 49

EDITOR’S QUESTION From decision trees to deep learning Security vendors are moving away from primitive machine learning tools towards deep learning algorithms to reduce the number of false positives, explains Harish Chib at Sophos. T he recent replacement of the decision-making tree with deep- learning neural networks to build tomorrow’s cyber security solutions, promises to be a significant differentiator amongst security vendors Analytical tools usually in the realm of artificial intelligence and machine- learning take into consideration user profiles, user behavior, normal business, to establish thresholds for normal and abnormal behavior. This is in comparison to traditional tools that use predefined signature patterns and scenarios of past attacks to detect and block incoming malicious behavior. Machine learning and artificial intelligence are the latest tools being applied to big data analytics. These include the decision-tree approach that has been in use since the nineties and deep neural networks or deep-learning. 7B6V7W&GfVF'2fR'VBFV 6WF2FV66G&VRv&F2FFWFV7B7&W'6V7W&GF&VG2FW6R&RvVVFW'7FBFV6VW0FWfVVBFR2&R&VFfVǐV7FW6RBvRB&fFPFWVFR&W7VG2FV66G&VRG6ǒ2vPb#VW7F2FFVFgBFWFV7@v&RFV66G&VR2fv6'BЦƖR7G'V7GW&Rv6V6FP&W&W6VG2FW7BGG&'WFRV6'&6&W&W6VG2FRWF6RbFRFW7Br2'Ff6FVƖvV6Pr7@W"6V7W&G6WF'FfƖBV6VbFR&W&W6VG2FV66FVgFW"6WFrGG&'WFW2FRF2g&&BFVb&W&W6V@676f6F'VW2FRƖ֗FF`FRFV66G&VR&62FBFPv&FVVG2F&RVǒ6WBW@FW&Vf&R2'VBVƖ֗FF2FVWV&rWGv&2rfFw0B&W7VG2F&RvVW&FVBg&FFvFWBWƖ6B&w&֖r6G&7@FFRFV66G&VR&6FVWV&pWFFW2FR&6W72BWFF6ǐFVFfW2FfVGW&W2W6rV&pWFG27&VB'FR'&f"F2&V6FVWV&pWGv&2&RfW'Fr6fVF6RV&r7&72FR7&W'6V7W&G6WFG66RFVWV&rWGv&667G0b6RVVVG26VBWW&2F@&V6VfRWB6vRFV"FW&7FFP&6VBFRWBB&GV6RWGW@FWFW&֖VB'FRGW&RbFRWB@FV"&6W72b7FfFFRWGv&2f&VBvVF0WGWBgW'FW"&V6W2FRWBf 6VV7FVBWW&2v6gW'FW"6vW0FV"FW&7FFR&6VB&VFVfV@vVvFvRB7FfFgV7F2FRvVvFvRBFRgV7FƗGb7FfF6&R6G&VBvFv&F6VBFRV&r'VRvVFVWV&r2ƖVBFFPW6R66Rbf6R6FfW2BFWFV7FbƖ6W2vV"Ɩ27&W'6V7W&G&66"f6R&W6FVB֖FFRV7B@g&662FVWV&r&GV6W2V6vW FWFV7F&vRW72f6R6FfW2@6W"fG&BVBG26&V@FFW"6WF26&6&WGvVVFRVff6V6W0bFVWV&rB6RV&p6&RFR'FrB@bf6R6FfW2BFWFV7F&FW2f6R6FfR2FRW&6VFvR&FR@v6Ɩ6W2Ɩ2&R676fVB0Ɩ6W2&6VB'F7V"6V6FfG6֖&ǒFRFWFV7F&FR2FPW&6VFvRbƖ6W2vV"Ɩ2FB&P6'&V7Fǒ676fVB2Ɩ6W2&6VB'F7V"6V6FfG'6WGFrf6R6FfR&FRbPW"֖ƖƖ6W2vV"Ɩ2FVWV&r66WfRFWFV7F&FPbs"Rf"WrƖ6W2vV"Ɩ2F@FBV"&WfW6ǒV6V@F&VBƗ7G2FR6fVFFV66G&VP&6666WfR6֖ FWFV7F&FR67W&7'WBǒ'7&V6rG2f6R6FfR&FRg&PW"֖ƖƖ6W2vV"Ɩ2FPW"FW6BƖ6W2vV"Ɩ2F227&V6RFR7`f6R6FfW27&W"6V7W&GfVF'2fW7FrFVWV&rFV6RFV"6WF0&RƖVǒFR6vf6Bv2f"V&W"b&V626VFrFRf7BF@FWfVVB'Ff6FVƖvV6R0&Vr'VBFVWV&r* C