Detecting malicious network activity in Azure Core Concept: Achieve transfer leaming by grouping similar tasks
8
Ensemble Tree Learning applications at Microsoft
9
Input data
10
Tree Ensembles - Algorithm
11
Tree Ensembles - Training
12
Tree Ensembles - Testing
13
Model performance and productization Model trained at regular intervals
14
Bonus Classifier can be used as an effective canary for emerging attacks
15
WannaCry Attack Timeline
16
Detecting Malicious PowerShell commands Core Concept: Transposing existing security problem into an already solved problem from another domain
17
PowerShell command lines - difficult to detect
18
Microsoft's Deep Learning toolkit (CNTK) applications
19
Deeper learning = representation learning
20
Technique overview
21
Neural Fuzzing Core Concept: Transposing existing security problem into an already solved problem from another domain
22
Seq2Seq Neural Architecture
23
Improved fuzzing intuition
24
readelf dataset example
25
Example readelf 2.28 model
26
Analysis by GDB exploitable plugin Target: Linux readelf 2.28
27
Readelf model performance over 48h and productization
28
Conclusion
29
Resources
Description:
Explore transfer learning applications in cybersecurity during this 46-minute RSA Conference talk by Mark Russinovich, Chief Technology Officer of Azure at Microsoft. Discover how machine learning algorithms developed for other domains can be repurposed to enhance cloud defense strategies. Learn about Microsoft's cloud security scale, traditional versus transfer learning approaches, and practical examples of applying transfer learning to detect malicious network activity in Azure and malicious PowerShell commands. Gain insights into ensemble tree learning, deep learning techniques, and neural fuzzing for improved security. Understand how these innovative approaches can be applied to your own cyber-defense efforts, with real-world examples such as the WannaCry attack timeline and readelf dataset analysis.
Transfer Learning - Repurposing ML Algorithms from Different Domains to Cloud Defense