GTRI_B-1 ArtificiaI Intelligence Methods for Detection and Handling of Software Behavior Anomalies Chris Simpkins Georgia Tech Research Institute

Slides:



Advertisements
Similar presentations
Approaches, Tools, and Applications Islam A. El-Shaarawy Shoubra Faculty of Eng.
Advertisements

Pat Langley Computational Learning Laboratory Center for the Study of Language and Information Stanford University, Stanford, California
Artificial Intelligence
1 Christophe S. Jelger, Michael Kleis, Burak Simsek, Rolf Stadler, Ralf König, Danny Raz Theories/formal methods in support of autonomic management Dagstuhl.
1.Data categorization 2.Information 3.Knowledge 4.Wisdom 5.Social understanding Which of the following requires a firm to expend resources to organize.
4 Intelligent Systems.
4-1 Management Information Systems for the Information Age Copyright 2002 The McGraw-Hill Companies, Inc. All rights reserved Chapter 4 Decision Support.
Chapter 4 DECISION SUPPORT AND ARTIFICIAL INTELLIGENCE
The Decision-Making Process IT Brainpower
Introduction to HCC and HCM. Human Centered Computing Philosophical-humanistic position regarding the ethics and aesthetics of a workplace Any system.
SESSION 10 MANAGING KNOWLEDGE FOR THE DIGITAL FIRM.
Artificial Intelligence
Intelligent Agent Systems. Artificial Intelligence Systems that think like humans Systems that think rationally Systems that act like humans Systems that.
PSU CS 370 – Artificial Intelligence Dr. Mohamed Tounsi Artificial Intelligence 1. Introduction Dr. M. Tounsi.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
1 Chapter 4 Decision Support and Artificial Intelligence Brainpower for Your Business.
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
Supporting Decision Making Chapter 10 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Eleventh Edition 1 Introduction to Essentials for Information Systems Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Eleventh Edition 1 Introduction to Essentials for Information Systems Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Extracting Test Cases by Using Data Mining; Reducing the Cost of Testing Andrea Ciocca COMP 587.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
Artificial Intelligence
Biointelligence Laboratory School of Computer Science and Engineering Seoul National University Cognitive Robots © 2014, SNU CSE Biointelligence Lab.,
Chapter 11 Managing Knowledge. Dimensions of Knowledge.
Artificial Intelligence
Copyright R. Weber INFO 629 Concepts in Artificial Intelligence Fall 2004 Professor: Dr. Rosina Weber.
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Analytics, Decision Support, and Artificial Intelligence:
Data Mining Chun-Hung Chou
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Enabling Organization-Decision Making
Chapter 10 Artificial Intelligence. © 2005 Pearson Addison-Wesley. All rights reserved 10-2 Chapter 10: Artificial Intelligence 10.1 Intelligence and.
Artificial Intelligence: Its Roots and Scope
Chapter 13 Genetic Algorithms. 2 Data Mining Techniques So Far… Chapter 5 – Statistics Chapter 6 – Decision Trees Chapter 7 – Neural Networks Chapter.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Artificial Intelligence Introductory Lecture Jennifer J. Burg Department of Mathematics and Computer Science.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Artificial intelligence systems form a broad and diverse set of.
Succeeding with Technology: Second Edition
ICS-FORTH 25-Nov Infrastructure for Scalable Services Are we Ready Yet? Angelos Bilas Institute of Computer Science (ICS) Foundation.
The New Computing Curriculum An overview. Computing A high-quality computing education equips pupils to use computational thinking and creativity to understand.
Chapter 13 Artificial Intelligence and Expert Systems.
I Robot.
Chapter 4 Decision Support System & Artificial Intelligence.
Multiagent System Katia P. Sycara 일반대학원 GE 랩 성연식.
Artificial Intelligence Center,
Eleventh Edition 1 Introduction to Essentials for Information Systems Irwin/McGraw-Hill Copyright © 2002, The McGraw-Hill Companies, Inc. All rights reserved.
Course Overview  What is AI?  What are the Major Challenges?  What are the Main Techniques?  Where are we failing, and why?  Step back and look at.
Reinforcement Learning AI – Week 22 Sub-symbolic AI Two: An Introduction to Reinforcement Learning Lee McCluskey, room 3/10
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
A field of study that encompasses computational techniques for performing tasks that require intelligence when performed by humans. Simulation of human.
Control-Theoretic Approaches for Dynamic Information Assurance George Vachtsevanos Georgia Tech Working Meeting U. C. Berkeley February 5, 2003.
Chapter 9 : Application Areas. 2 Some Advance Application Areas of Computers  Software Development  Artificial Intelligence  Robotics  Industrial.
Democritus University of Thrace Dep. of Forestry & Management of the Environment & Natural Resources Forest Informatics Laboratory Konstantinos Demertzis.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
CHAPTER ELEVEN MANAGING KNOWLEGE. Objectives We have been through some of this already Role of knowledge management Types of knowledge management systems.
Postgraduate stud. Al-Ahnomi Montaser Don State Technical University Department “Computer-aided design" Theme:- "development and research of intelligent.
Introduction to Machine Learning, its potential usage in network area,
Information Systems Decision Support and Artificial Intelligence
Classification of models
Introduction Characteristics Advantages Limitations
2009: Topics Covered in COSC 6368
Eick: Introduction Machine Learning
Decision Support and Artificial Intelligence Chapter 4
MANAGING KNOWLEDGE FOR THE DIGITAL FIRM
Artificial Intelligence introduction(2)
CHAPTER TWO OVERVIEW SECTION DECISION-MAKING SYSTEMS
Christoph F. Eick: A Gentle Introduction to Machine Learning
Introduction to Artificial Intelligence Instructor: Dr. Eduardo Urbina
Artificial Intelligence
Presentation transcript:

GTRI_B-1 ArtificiaI Intelligence Methods for Detection and Handling of Software Behavior Anomalies Chris Simpkins Georgia Tech Research Institute

GTRI_B-2 Key Problem #1: Self-Aware Software For Applications Community vision to work, software must “know” when something is wrong Formally, software systems (or wrappers/monitors) must implement the function F({features} +,g(t)) -> normal/abnormal operation Features can be disk I/O, system calls, etc g(t) is some characterization of the features with respect to some time-slicing {features} +, g, and t are optimizable model parameters F is a learnable (approximatable) function.

GTRI_B-3 Solving the Self-Aware Software Problem Solution: Create intelligent agents that can monitor software behavior, learn patterns in behavior, and use this knowledge to diagnose and solve problems Georgia Tech researchers solve similar problems in other domains: Mutual Information Maximizing Input Clustering (MIMIC) and genetic algorithms for antenna design, neural network optimization (Isbell, Simpkins, Maloney, Kemper, Markle, Bueno) Continuous case-based reasoning for robotic navigation, equipment condition monitoring (Ram) Machine learning techniques to identify software execution phases in time-series data (Ozakin)

GTRI_B-4 Key Problem #2: Multiple Instances of Vulnerable Software There are many instances of the same software running on multiple computers They can fail or be attacked individually, collectively, or in any combination Recognizing an attack may require collective knowledge of many/all software instances

GTRI_B-5 Solving the Multiple Instances Problem Solution: Create multi-agent systems of intelligent, self- aware software agents which collaborate to create shared situation awareness and offer more options for dealing with problems. Georgia Tech researchers solve similar problems in other domains: Adaptive network intrusion detection using distributed data mining (Lee) Social intelligence in large scale multi-agent systems: ant and bee behavior modeling (Balch, Dellaert) RoboCup robotic soccer dogs (Balch)

GTRI_B-6 AI Needed to Make Application Communities Work Key Problem #1: Making Software Self-Aware Solution: Intelligent agents employing machine learning to detect anomalies Key Problem #2: Multiple Copies Solution: Compose self-aware software into collaborative multi-agent systems Georgia Tech has solved these AI problems in other domains, can solve them for AC

GTRI_B-7 More Information Georgia Tech College of Computing Georgia Tech Information Security Center Cognitive Computing Lab BORG Lab