1 / 12

Personalized Cybersecurity for Dummies

Jaime G. Carbonell. Mehrbod Sharifi. Eugene Fink. Personalized Cybersecurity for Dummies. Application of machine learning and crowdsourcing to adapt cybersecurity tools to the needs of (naïve) individual users. Different users need different security tools. Individual user differences.

Download Presentation

Personalized Cybersecurity for Dummies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Jaime G.Carbonell MehrbodSharifi EugeneFink Personalized Cybersecurityfor Dummies Application of machine learning and crowdsourcing to adapt cybersecurity tools to the needs of (naïve) individual users.

  2. Different users need different security tools. Individual user differences • Security needs- Data confidentiality- Data-loss tolerance- Recovery costs • Usage patterns • Computer knowledge

  3. Problems • Inflexible engineered solutionswith “too much security”- Too high security at high costs- Insufficient customization REIGN OF CONFUSION • “Advanced user” assumption- Complicated customization- Unclear security warnings

  4. Typical response of naïve users: • Always no (too much security) • Always yes (not enough security) • Ask a techie if available Examples

  5. User naïveté correctanswers Population statistics Computer use byage and gender

  6. Population statistics • Almost everyone uses a computer • Most users are naïve, with very limited technical knowledge • Many security problems aredue to the user naïveté When an average user deals with security issues, she needs basic advice and handholding.

  7. Long-term goal We need an automated security assistant that learns the needs of the individual user and helps the user to apply security tools. MACHINE LEARNING TO THE RESCUE

  8. DEMO Initial results A security assistant for web browsing, integrated with Internet Explorer.

  9. Scams (welcome to Nigeria) • Rip-offs (overpricing, low quality) • Bad info (inaccurate, biased) • ... and so on More problems Automated tools cannot detect “advanced” threats that go beyond software attacks.

  10. Filter Integrate Long-term goal Rely on the collective wisdom of the users. CROWDSOURCING TO THE RESCUE Gather USERS OF THE WORLD, UNITE!

  11. AVAILABLE AT WWW.CYBERPSA.COM DEMO Initial results A browser plug-in for the gathering of opinions and warnings about web pages.

  12. Future research • Summarization of comments • Analysis of sentiments and biases • Identification of reliable contributors • Synergy with other techniques for analysis of web pages • … and so on

More Related