Machine Learning
Neural nets (NN) are a subset of machine learning (ML). Think of ML as the world of ‘will be’ and NN as the world of ‘is’.
The field of ML interests itself in the construction of mechanisms (algorithms) which spend the least time learning and provide the best ‘predictions’ when faced with some input. In learning an input is provided, and based on that input, an output produced. During training a difference ‘signal’ is fed back to the learner saying how far the output is from the desired result. The field requires some proficiency in statistics, differential calculus and linear algebra.
On the other hand, a neural net attempts to mimic the brain. Roughly, a neural net consists of an input layer, an output layers, and a layer between which we might as well call the ‘brain’.
Conceptually, the input layer is the sensor, accepting raw input and converting it into something the ‘brain’ understands. If the raw input is an analog signal, then this is digitzed and sent to the ‘brain’. The ‘brain’ processes the input and sends it’s result to one or more output devices. In an analogous fashion to neurons in the human brain, the machine brain ‘neurons’ connect to one or more other neurons and to one or more input or output devices. The ‘learning’ consists of ‘teaching’ the brain to weight the arcs connecting other neurons to itself. This weighting becomes the processing element which allows different (or the same) input to be treated differently at each neuron. Consider that your spouse has high reliability. Everything your spouse says must be seriously considered. On the other hand, your mother-in-law is seldom correct in the things said. So there is less credence given to statement from this source, and the weight is low whereas, the weight is higher for your spouse.
Our NN neurons need some processing capability to determine what adjustments of the input arc weights must be done. This processing element is the ML. Each neuron is actually ML software, and the input ‘arcs’ are data structures. Think of the ‘brain’ as being a graph where the graph nodes are the ML software, and the graph arcs are the weigthed input arcs.
During training a known input causes an output. This output is accepted or rejected, forming a correction to the ‘brain’. Based on this correction, the arc weights are adjusted. At the end of training, the arc weights and the ML neurons produce an output consistent with expectations. The NN learns.
Classification of a problem, (Yes/No) is not the only application. We have examples of self-classification, there is no human derived ‘correction’, instead the internal logic of the brain does it’s own classification. We have ‘recognition’, were a complex input signal, e.g., the accented human voice, is used to identify the spoken word, and so on.
The concept is that a NN is hosted on a single computer or multiple computers with or without multi-threading, and each neuron is cycled through to yield some result.<p?
This web page has references which show how the ML forms a decision, and describes the ML use in a NN.</p?
The different sections can be categorized as follows:
- Articles: Have little technical heft and can be considered as light reading, opiniions, and conjectures as the state of the craft.
- Research & Reports: Requires a level of expertise ranging from familiar to experienced. The items generally assume some non-trivial level of understanding of Cyber Security and/or Machine learning.
- Books: Surveys and didactic material suitable for in-depth learning. Generally texts with large heft.
- Resources: Other web sites containing matrial similar to this page. Allows extanded learning.
<liReferences: Additional material nnot directly related to cyber security.
Articles
- Application of Neural Networks to Intrusion Detection/a>
- Automating Threat Defense:
- Applications of Machine Learning in Cyber Security
- Applying Machine Learning to Advance Cyber Security Analytics
- Big data and machine learning: A perfect pair for cyber security?
- Cybersecurity, data science and machine learning: Is all data equal?
- Cybersecurity trends 2017: Malicious machine learning, state-sponsored attacks, ransomware and malware
- Deep Learning for Cyber Security in Scientific Computing
- Exploiting machine learning in cybersecurity
- How is machine learning used in cyber security?
- How Machine Learning Can Improve Healthcare Cybersecurity
- Is machine learning the future for cyber security?
- Intro To Machine Learning & Cybersecurity: 5 Key Steps
- Machine Learning: a New Cyber Security Weapon
- Machine Learning Applied to Cyber Security
- Machine learning can also aid the cyber enemy: NSA research head
- Machine Learning in Azure Security Center
- Machine Learning in Cybersecurity
- Machine learning in cybersecurity: what is it and what do you need to know?
- Machine learning in cybersecurity will boost big data, intelligence, and analytics spending
- Oracle bets on supervised machine learning for cybersecurity edge
- Practical applications of machine learning in cyber security
- Subscribe to Data Informed Cyber Security Skill Shortage: A Case for Machine Learning
- The Role of Artificial Intelligence in Cyber Security
- The Security Download: Anticipating Cyberattacks with Machine Learning
- What Machine Learning Can Bring to IT Security
- Why Machine Learning Is Our Last Hope for Cybersecurity
- Why Machine Learning Will Help Improve Government Cybersecurity in 2017
Research & Reports
- A Signal Processing Approach for Cyber Data Classification with Deep Neural Networks
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- Advances in Cloud – Scale Machine Learning for Cyber – Defense
- Adversarial Data Mining for Cyber Security
- Artificial Neural Networks for Misuse Detection
- Cyber Security Tremds fpr Future Smart Grid Systems
- Defeating Machine Learning
- Exploiting machine learning in cybersecurity
- Framework for Machine Learning and Data Mining in the Cloud
- How to Crush the Health Sector’s Ransomware Pandemic
- Machine Learning: A Probabilistic Perspective
- Machine Learning Algorithms for Classification
- An Evaluation of Machine Learning in Algorithm Selection for Search Problems
- Machine Learning in the Cyber Secuirty Domain
- Machine Learning for Attack Vector Identification in Malicious Source Code
- Machine Learning Using R
- Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
- Ratchet: The Underdog of Machine Learning Algorithms
- Security Assessment of Software Design using Neural Network
- The Application of Deep Learning on Traffic Identification
- The Role of Machine Learning in Fraud ManagementT
- Using Clustering and Machine Learning for Anomolous Breach Detection
- What Your Security Vendor is not Telling You
- Machine Learning Approaches to Network Anomaly Detection
- When Cyber Security Meets Machine Learning
books
- A Course in Machine Learning
- Bayesian Reasoning and Machine Learning
- Introduction to Machine Learning
- Machine Learning – The Complete Guide
- Machine Learning and Data Mining Lecture Notes
- Understanding Machine Learning: From Theory to Algorithms
Resources
- Computer World UK
- Explore scientific, technical, and medical research on ScienceDirect
- GCN Technology, Tools and Tactics for Public Sector IT
- GITHub: Free Machine Learning eBooks
- ICIT: Institute for Critical Infrastructure Technology
- KPMG Cyber Trends Index
- GitHUB: Machine Learning for Cyber Security
- GitHUB: Free Machine Learning eBooks
- Intro To Machine Learning & Cybersecurity: 5 Key Steps
- Machine Learning & Cyber Security
- Machine Learning for Cyber Secuirty
- Machine Learning and Cyber Security Resources
References
- A First Encounter with Machine Learning
- Foundations of Machine Learning: Introduction to ML
- Neural Networks and Deep Learning
- Introduction to Machine Learning – Second Edition
- Machine Learning: Martin Sewell
- Machine Learning: Tom Mitchell
- The Definitive Security Data Science Machine Learning Guide
- The Discipline of Machine Learning
- COS 511: Theoretical Machine Learning