A Game between Adversary and AI Scientist
Offered By: nullcon via YouTube
Course Description
Overview
Explore a conference talk from Nullcon Goa 2018 that delves into the intriguing dynamics between adversaries and AI scientists in cybersecurity. Discover how game theory and artificial intelligence can be applied to information security, creating a realistic simulation of attacker-defender interactions. Learn about the challenges of designing such games, the role of AI-powered tools in observing adversary actions, and various tactics and techniques employed by both sides. Gain insights into topics like visibility, deception, DNS tunneling attacks, and detection methods. Examine real-world scenarios, data pipelines, and the application of game theory in cybersecurity. Conclude with a discussion on open problems, future visions, and the comparison between AI and human intelligence in this critical field.
Syllabus
Introduction
Who am I
Gameplan
Problem
The Adversary
The Defender
The Game
Tactics and Techniques
Visibility
Deception
Adversary
Demo
Scenario
What Adversary does
Attack Scenario
Adversary Attack
Defender Attack
DNS Tunnel
DNS Tunnel Attack
Detect DNS Tunnel Attack
Combination of Deception AI
Use Cases
Data Pipeline
Tactic and Technique
Definition of a Game
The Game Theory
Alphago
Open Problems
Futuristic Vision
Questions
AI vs Human Intelligence
Taught by
nullcon
Related Courses
Game TheoryStanford University via Coursera Model Thinking
University of Michigan via Coursera Online Games: Literature, New Media, and Narrative
Vanderbilt University via Coursera Games without Chance: Combinatorial Game Theory
Georgia Institute of Technology via Coursera Competitive Strategy
Ludwig-Maximilians-Universität München via Coursera