Defensive AI in Cybersecurity - Master's Course
34 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What role do recurrent neural networks (RNN) play in the field of malware detection?

  • They predict early-stage malware based on patterns. (correct)
  • They analyze phishing email content for malicious links.
  • They generate user and entity behavior profiles.
  • They perform authentication using biometric data.
  • Which machine learning model is mentioned for filtering phishing URLs?

  • Expandable Random Gradient Stacked Voting Classifier (ERG-SVC) (correct)
  • Deep Reinforcement Learning Classifier
  • Generative Adversarial Network Classifier
  • Support Vector Machine Classifier
  • For what purpose is user and entity behavior analytics (UEBA) employed?

  • To enhance the speed of phishing email identification.
  • To continuously monitor and identify deviations in user behavior. (correct)
  • To reinforce identity verification through biometric authentication.
  • To streamline the process of malware detection.
  • What kind of data is analyzed in phishing detection to identify malicious activities?

    <p>Content and context of communications</p> Signup and view all the answers

    How does AI/ML contribute to identity verification in cybersecurity?

    <p>Through biometric authentication and facial recognition technologies</p> Signup and view all the answers

    What is the primary focus of the document regarding vulnerability analysis?

    <p>Automated post-mortem analysis using natural language processing</p> Signup and view all the answers

    Which method is highlighted for backup scheduling within the document?

    <p>Markov chains for modeling and optimization</p> Signup and view all the answers

    What type of applications are discussed concerning AI in cybersecurity?

    <p>AI applications within the CCN-CERT framework</p> Signup and view all the answers

    Which reference indicates a critique of the relationship between machine learning and cybersecurity?

    <p>CSET: Machine Learning and Cybersecurity Hype and Reality</p> Signup and view all the answers

    What year was the literature review mentioning AI in cybersecurity published?

    <p>2023</p> Signup and view all the answers

    Which Core Function primarily focuses on understanding and prioritizing cybersecurity risks?

    <p>Identify</p> Signup and view all the answers

    Which core functions are primarily supported by AI/ML methods?

    <p>Protect and Detect</p> Signup and view all the answers

    What is a key purpose of AI/ML methods in cybersecurity according to the Core Functions?

    <p>Serving as an autonomous decision mechanism</p> Signup and view all the answers

    Which component is NOT explicitly part of the Protect function in the NIST Core Framework?

    <p>Risk Assessment</p> Signup and view all the answers

    What role does Security Continuous Monitoring play within the NIST Core Functions?

    <p>Aids in the Detect function</p> Signup and view all the answers

    Which function addresses improvement and recovery planning in the NIST framework?

    <p>Recover</p> Signup and view all the answers

    In the context of the NIST Cybersecurity Framework, what is primarily involved in the Detect function?

    <p>Tracking detection processes</p> Signup and view all the answers

    Which of the following elements contributes to the Protective Technology component of the Protect function?

    <p>Encryption practices</p> Signup and view all the answers

    What is the primary purpose of using k-means clustering in asset cybersecurity classification?

    <p>To create groups of similar security assets</p> Signup and view all the answers

    Which AI/ML method is used to automate vulnerability classification from its description?

    <p>Topic Modeling</p> Signup and view all the answers

    How does AI/ML contribute to cybersecurity risk assessment?

    <p>It quantifies risks and predicts potential impacts</p> Signup and view all the answers

    What is the role of Natural Language Processing (NLP) in threat intelligence?

    <p>To process large volumes of threat data for emerging threats</p> Signup and view all the answers

    Autonomous Penetration Testing based on Improved Deep Q-Network focuses on which aspect of cybersecurity?

    <p>Automating penetration test processes</p> Signup and view all the answers

    Which approach utilizes risk scoring using Fuzzy Sets in cybersecurity?

    <p>Asset criticality and risk prediction</p> Signup and view all the answers

    What aspect of AI/ML is utilized in AutoPentest-DRL?

    <p>Deep reinforcement learning techniques</p> Signup and view all the answers

    What is one of the key benefits of implementing AI/ML in vulnerability assessments?

    <p>Automatically proposing mitigations</p> Signup and view all the answers

    What role does AI/ML play in intrusion detection and prevention?

    <p>It monitors network traffic and system behavior in real-time.</p> Signup and view all the answers

    Which of the following approaches is used for anomaly detection in network traffic?

    <p>Auto-Encoders</p> Signup and view all the answers

    How does Security Orchestration, Automation, and Response (SOAR) enhance incident response?

    <p>By selecting and executing predefined actions automatically.</p> Signup and view all the answers

    What is the primary focus of AI-powered honeypots?

    <p>To enhance IoT botnet detection.</p> Signup and view all the answers

    Which technology is employed to tackle class imbalance in intrusion detection systems?

    <p>Generative Adversarial Networks (GANs)</p> Signup and view all the answers

    What is the goal of automatic incident response systems?

    <p>To restore systems to normal operations with enhanced resilience.</p> Signup and view all the answers

    What does the term UEBA stand for in the context of network traffic analysis?

    <p>User Entity Behavior Analytics</p> Signup and view all the answers

    Which method is used for predicting cyber-events through analysis?

    <p>Sentiment analysis on hacker forums.</p> Signup and view all the answers

    Study Notes

    CYB. Defensive AI (part 2)

    • This is a Master's in Artificial Intelligence course, 2024/25 at ESEI University of Vigo.
    • The course is focused on defensive AI.

    AI/ML in NIST Core Functions

    • AI/ML methods are employed in various cybersecurity subtasks, including detection, prediction, and response.
    • These methods can contribute to several core functions simultaneously.
    • AI/ML is predominantly used within the Protect and Detect functions, though they often overlap.

    NIST Cybersecurity Framework Core Functions

    • Identify: Asset management, business environment, governance, risk assessment, and risk management are central to this function.
    • Protect: Access control, awareness & training, data security, information protection, processes, maintenance, and protective technology are crucial here.
    • Detect: Anomalies and events, security continuous monitoring, and detection processes are essential to this component.
    • Respond: Response planning, communications, and improvements are important to this function.
    • Recover: Improvements, recovery planning, communications, and mitigation are critical.

    AI/ML in NIST Core Functions (II)

    • Identify: Includes asset management, business environment, governance, and risk assessment. Automated systems and processes are highlighted for risk assessment and policy enforcement.
    • Protect: Features identity management, authentication/access control, awareness and training, data security, and information protection. Automated validation of security controls is a key aspect.
    • Detect: Includes anomalies and events detection, security continuous monitoring, and detection processes. Automated threat intelligence sources and analysis are mentioned.
    • Respond: Consists of response planning, communications, and improvements. Automated responsibility allocation and incident reporting are mentioned components.
    • Recover: Covers recovery planning, improvements, communication, and mitigation. Includes aspects like automated isolation, incident characterization, and remediation.

    AI/ML in NIST Core Functions (III)

    • Identify: Automatic asset inventory using AI/ML clustering, vulnerability assessment using AI/ML (automatic scanning).
    • Automation of vulnerability classification from descriptions using machine learning. Common vulnerabilities and exposures (CVE) database analysis by topic modeling and classification is mentioned.
    • Red Team and Penetration Testing: AI/ML/RL can automate certain aspects (AutoPentest-DRL). Autonomous penetration testing using improved deep Q-Networks.

    AI/ML in NIST Core Functions (IV)

    • Cybersecurity Risk Assessment: AI/ML quantifies risks, assets, and vulnerabilities, using text mining for analysis of online hacker forums.
    • Risk prediction: Asset criticality and forecasting is critical for comprehensive risk management, potentially using fuzzy sets.
    • Threat Intelligence: AI/ML/NLP processes large threat intelligence datasets to identify and assess emerging threats and vulnerabilities.

    AI/ML in NIST Core Functions (V)

    • Protect: Malware detection & analysis using recurrent neural networks (RNNs), early-stage prediction.
    • Phishing Detection: AI/ML/NLP identifies phishing emails and malicious links by analyzing content, sender behavior, and context. Robust ensemble models developed for filtering phishing URLs and related DNS.
    • Authentication & Identity Verification: AI/ML used for biometric authentication, facial recognition, and behavioral analytics; ensuring a robust identification system.
    • User and Entity Behavior Analytics (UEBA): AI/ML profiles user behavior to detect deviations from normal activity to detect potential security incidents in User and Endpoint Behavior Analytics.

    AI/ML in NIST Core Functions (VI)

    • Detect: Intrusion Detection and Prevention systems using AI and machine learning. Intrusion detections based on AI-powered honeypots for enhanced IoT botnet detection. Anomaly detection models applied on network traffic and various forensic data.
    • Anti-fraud systems and network traffic analysis are highlighted, using AI/ML models. Detection of threat actors by analysing sentiments in hacker forums.

    AI/ML in NIST Core Functions (VII)

    • Respond: Security Orchestration, Automation, and Response (SOAR) – AI/ML to automate incident response, using techniques like heterogeneous security event prioritization and intelligent dynamic and isolation of ransomware attacks and mitigation.
    • Automatic Incident Response: A Case-Based Reasoning approach to aid the development of response methodologies and the creation of incident response playbooks. Recommendation systems for selecting the appropriate playbook are used.

    AI Applications in Cybersecurity (CCN-CERT BP/30)

    • This document provides a framework for AI applications in cybersecurity, outlining AI applications for areas like threat detection, intrusion analysis, and automated responses.
    • It emphasizes areas like biometric identification, improved automation, and threat intelligence.

    Complementary References

    • This section includes key publications on artificial intelligence for cybersecurity (including those related to literature reviews, future research directions, and specific research findings).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    CYB. Defensive AI (part 2) PDF

    Description

    This quiz tests your knowledge of Defensive AI concepts as part of the Master's program in Artificial Intelligence at ESEI University of Vigo for 2024/25. Dive into AI/ML applications in cybersecurity, focusing on the NIST Cybersecurity Framework's core functions like Identify, Protect, Detect, and Respond.

    More Like This

    Aula 1 - Pós
    47 questions

    Aula 1 - Pós

    UncomplicatedSard avatar
    UncomplicatedSard
    Cyber Warfare and AI Quiz
    5 questions
    Use Quizgecko on...
    Browser
    Browser