A Game between Adversary and AI Scientist
Offered By: nullcon via YouTube
Course Description
Overview
Explore a conference talk from Nullcon Goa 2018 that delves into the intriguing dynamics between adversaries and AI scientists in cybersecurity. Discover how game theory and artificial intelligence can be applied to information security, creating a realistic simulation of attacker-defender interactions. Learn about the challenges of designing such games, the role of AI-powered tools in observing adversary actions, and various tactics and techniques employed by both sides. Gain insights into topics like visibility, deception, DNS tunneling attacks, and detection methods. Examine real-world scenarios, data pipelines, and the application of game theory in cybersecurity. Conclude with a discussion on open problems, future visions, and the comparison between AI and human intelligence in this critical field.
Syllabus
Introduction
Who am I
Gameplan
Problem
The Adversary
The Defender
The Game
Tactics and Techniques
Visibility
Deception
Adversary
Demo
Scenario
What Adversary does
Attack Scenario
Adversary Attack
Defender Attack
DNS Tunnel
DNS Tunnel Attack
Detect DNS Tunnel Attack
Combination of Deception AI
Use Cases
Data Pipeline
Tactic and Technique
Definition of a Game
The Game Theory
Alphago
Open Problems
Futuristic Vision
Questions
AI vs Human Intelligence
Taught by
nullcon
Related Courses
Unearthing Malicious and Risky OpenSource Packages Using Packjnullcon via YouTube Pushing Security Left by Mutating Byte Code
nullcon via YouTube The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube Contextomy - Let's Debug Together
nullcon via YouTube Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube