YoVDO

A Game between Adversary and AI Scientist

Offered By: nullcon via YouTube

Tags

nullcon Courses Artificial Intelligence Courses Cybersecurity Courses Game Theory Courses

Course Description

Overview

Explore a conference talk from Nullcon Goa 2018 that delves into the intriguing dynamics between adversaries and AI scientists in cybersecurity. Discover how game theory and artificial intelligence can be applied to information security, creating a realistic simulation of attacker-defender interactions. Learn about the challenges of designing such games, the role of AI-powered tools in observing adversary actions, and various tactics and techniques employed by both sides. Gain insights into topics like visibility, deception, DNS tunneling attacks, and detection methods. Examine real-world scenarios, data pipelines, and the application of game theory in cybersecurity. Conclude with a discussion on open problems, future visions, and the comparison between AI and human intelligence in this critical field.

Syllabus

Introduction
Who am I
Gameplan
Problem
The Adversary
The Defender
The Game
Tactics and Techniques
Visibility
Deception
Adversary
Demo
Scenario
What Adversary does
Attack Scenario
Adversary Attack
Defender Attack
DNS Tunnel
DNS Tunnel Attack
Detect DNS Tunnel Attack
Combination of Deception AI
Use Cases
Data Pipeline
Tactic and Technique
Definition of a Game
The Game Theory
Alphago
Open Problems
Futuristic Vision
Questions
AI vs Human Intelligence


Taught by

nullcon

Related Courses

Unearthing Malicious and Risky OpenSource Packages Using Packj
nullcon via YouTube
Pushing Security Left by Mutating Byte Code
nullcon via YouTube
The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube
Contextomy - Let's Debug Together
nullcon via YouTube
Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube