{"id":1017,"date":"2016-07-25T15:19:39","date_gmt":"2016-07-25T13:19:39","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=1017"},"modified":"2023-08-06T21:54:43","modified_gmt":"2023-08-06T19:54:43","slug":"machine-learning-in-secure-systems","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/25\/machine-learning-in-secure-systems\/","title":{"rendered":"Machine Learning in secure systems"},"content":{"rendered":"<p style=\"text-align: justify;\">Sadly today&#8217;s security systems often be hacked and sensitive informations get stolen. To protect a company against cyber-attacks security experts define a &#8220;rule set&#8221; to detect and prevent any attack. This \u201canalyst-driven solutions\u201d are build up from human experts with their domain knowledge. This knowledge is based on experiences and build for attacks of the past. But if any attack don&#8217;t match the rules, the secure system don&#8217;t recognizes it and the security is broken.<\/p>\n<p style=\"text-align: justify;\">The question is: Is there a possibility to train a model based on past attacks to predict further attacks?<\/p>\n<p style=\"text-align: justify;\"><!--more--><\/p>\n<p style=\"text-align: justify;\">For a company it&#8217;s really hard to define a rule set to protect all kind of attacks. Also the world is changing every day and the attacks are evolving too. In addition the environment of a company get more scaled and distributed because of mobile networks, clouds and Internet of Things (IoT).<\/p>\n<p style=\"text-align: justify;\">This blog post demonstrates a potential way to create a security system based on machine learning in theory. Finally this post present a real world solution by a group of researchers from MIT\u2019s <a href=\"http:\/\/www.csail.mit.edu\/\">Computer Science and Artificial Intelligence Laboratory<\/a> (CSAIL) and the startup <a href=\"https:\/\/www.patternex.com\/\">PatternEx<\/a>. This solution allows to detect attacks in real-time merged with the knowledge of security experts.<\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Big picture: Machine learning<br \/>\n<\/span><\/h2>\n<blockquote>\n<p style=\"text-align: left;\">\u201cWell-posed Learning Problem: A computer is said to learn from experience E with respect to some task T and some performance measure P, if its\u201d<\/p>\n<p style=\"text-align: right;\"><em>T. Mitchell , 1997<\/em><\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">Machine learning is a science field of Artificial Intelligence (AI) and Pattern Matching. That gives a computer the ability to learn without being explicitly programmed (A. Samuel, 1959). A machine learning algorithm gets a specific task. In our case this algorithm need to detect attacks based on the collected data from an existing security system. The machine learning model is searching for attack patterns and gains experience over time. After many iterations of learning the model creates an output for each event in the dataset and validates one by one with some performance measures like the accuracy.<\/p>\n<p style=\"text-align: justify;\">To learn more about machine learning click <a href=\"https:\/\/www.coursera.org\/learn\/machine-learning\">here<\/a>.<\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The Machine learning flow for secure systems<br \/>\n<\/span><\/h2>\n<p style=\"text-align: justify;\">In current big networks a lot of monitoring takes place. A company use many resources to collect and store all logs in their internal databases. There are tons of collected events every day. These events need to be analyzed and the secure system need to detect attacks. This collected big data can be used as an input for a machine learning model to learn attack patterns.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_flow_landscape.jpg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1150\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/25\/machine-learning-in-secure-systems\/machine_learning_sesy_flow_landscape\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_flow_landscape.jpg\" data-orig-size=\"1723,750\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;claudius&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1469614304&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Machine_learning_SeSy_flow_landscape\" data-image-description=\"&lt;p&gt;Picture by Claudius Messerschmidt&lt;\/p&gt;\n\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_flow_landscape-1024x446.jpg\" class=\"alignnone wp-image-1150 \" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_flow_landscape-300x131.jpg\" width=\"671\" height=\"293\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_flow_landscape-300x131.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_flow_landscape-768x334.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_flow_landscape-1024x446.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_flow_landscape.jpg 1723w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Overview of the machine learning workflow;<\/p>\n<p style=\"text-align: justify;\">There are five steps to set up a machine learning pipeline for a security task. First of all the researchers need to collect all available data for the later model. This data are assembled from server syslogs, network traffic, end-points data, external DBs and many more. The more data the better the result.<\/p>\n<p style=\"text-align: justify;\">Based on this data Feature Extraction takes place. These features allow pattern matching on all data sets to detect an cyber-attack by using a machine learning algorithm. Some features could be the IP-address, the port number, the transmitted data, the timestamp or the device type.<\/p>\n<p style=\"text-align: justify;\">The third step in the machine learning flow is the training of the model. A machine learning model fall into one of two categories: Supervised learning with labeled data. All events in the input need the label &#8220;attack&#8221; or &#8220;no attack&#8221;. The label is used while the training compares the predicted- with the real-label. The other category is unsupervised learning without any label. The algorithm compares events with each other and search for abnormal patterns in the incoming datasets.<\/p>\n<p style=\"text-align: justify;\">After the training an output is generated. The result is transparent and allows investigation and explanations, such as the triggered source of the attack or the most important features of the attack pattern.<\/p>\n<p style=\"text-align: justify;\">To improve the accuracy of the model the system gets tuned based on customers feedback which all previous steps can be adjusted and modified. In the end the pipeline are customized for a security systems task mounted on the <span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"\">individually<\/span><\/span> customer network.<\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Challenging aspects<br \/>\n<\/span><\/h2>\n<p style=\"text-align: justify;\">To set up a machine learning pipeline for a security task is very difficult. There are a lot of challenging aspects to take care of:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Anomaly Detection:<\/strong> A real world application only has access to unlabeled data, <span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"\">therefore<\/span><\/span> the model must learn abnormal pattern and outlier events. This fact leads to an unsupervised learning algorithm.<\/li>\n<li><strong>High cost of errors:<\/strong> On the one hand the model need to find all cyber-attacks and on the other hand a model which trigger too much false positives ( = normal event detect as an attack) is not used in practice.<\/li>\n<li><strong>Data is not public:<\/strong> Training an algorithm for secure systems is very difficult because external persons don&#8217;t get access to the necessary data. <span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"\">So the researchers must be physically present in the company.<\/span><\/span><\/li>\n<li><strong>Semantic gap:<\/strong> The detection of an attack is not enough, we also need to know the source, the damage, the period of time ect..<\/li>\n<li><strong>Evaluation difficulties:<\/strong> For an two-class classification problem a machine learning model need half data from each class. The problem is that the data normally includes very few attacks. So the model must learn a compression-pattern with very low reconstruct errors for normal events. If an event has a big reconstruction error the model detect a potential attack.<\/li>\n<li><strong>Adversarial environment:<\/strong> The attacks and the network chang or evolve every day and the algorithm need to take care of this in real-time. So the machine learning pipeline must compare events over different periods of time.<\/li>\n<li><strong>Real time:<\/strong> An attack must detect in real-time in a distributed and very large system. <span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"\">That means<\/span><\/span> the whole pipeline must be updated in a short amount of time without any break.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The best way to solve this problems is to combine the knowledge from security experts and machine learning experts. This experts need to understand the data at all and share the knowledge to build up a clear environment for the algorithm.<\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">AI\u00b2: Training a big data machine to defend<br \/>\n<\/span><\/h2>\n<p style=\"text-align: justify;\">Researchers from MIT have developed a machine learning algorithm for secure systems in April 18, 2016. It demonstrates how an artificial intelligent platform called AI\u00b2 predict cyber-attacks in a real world network. The goal from AI\u00b2 is to defend a network of an organization and predict attacks in a minute-to-minute period of time.<\/p>\n<p style=\"text-align: justify;\">The results from this system are quite amazing. The algorithm detect 85% of all attacks, which is three times better than previous benchmarks. The system also found some not known hidden attacks in the data. Another important result is that the false positives are reduced by the factor of 5. The used data are merges from 3.6 billion log lines which were generated by millions of users in about three months. The most important aspect is that the system combine the powerful pattern matching of machine learning and the domain knowledge of intern security experts.<\/p>\n<p style=\"text-align: justify;\">In the first step of AI\u00b2 an unsupervised learning algorithm searches for abnormal pattern based on defined features of the stored events. Every detected anomaly could be a potential cyber-attack. After that these anomalies are presented to human analysts in a ranking system. The analysts decide which of this anomalies\/events are cyber-attacks and which are normal events in the network. This generated feedback is used as an input for another second machine learning algorithm (supervised learning). This second algorithm learns the pattern of the detected attack. Now the output of both algorithms are merged afterwards in the ranking system. Because of this combination the system learns the pattern of an attack based on the knowledge of security experts. The labeling is tricky because of the manually labeling for events by human analysts. The quality of a label depends on the knowledge from the experts. So you need very skilled security experts.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/b6Hf1O_vpwQ?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/p>\n<p style=\"text-align: justify;\">AI\u00b2: Overview of the AI\u00b2-driven cybersecurity prediction;<\/p>\n<p style=\"text-align: justify;\">For the challenge of evolving attacks AI\u00b2 uses three different unsupervised-learning methods for the detection of anomalies. All predicted abnormal events are fused together in the ranking system and sorted in the top k events. This leads to the advantage if one of this three algorithms isn&#8217;t able to predict an attack event as an anomaly.<\/p>\n<p style=\"text-align: justify;\">In practice on the first day of training this system picks the 200 most abnormal events and experts decide which of them are attacks. Over the time the system improves the accuracy. So it identifies more and more events as attacks. That means that the experts only need to look on 30-40 events per day, because the system has learned the pattern of attacks.<\/p>\n<p style=\"text-align: justify;\">The researchers of AI\u00b2 say that the system can handle billions of log lines per day, transforming them into new datasets every minute. Every dataset is splitted into features which are needed to predict abnormal events in the networks.<\/p>\n<p style=\"text-align: justify;\">All in all the system is learning the pattern of cyber-attacks which are labeled by security experts and the amount of abnormal events per day reduce for each known pattern. &#8220;That human-machine interaction creates a beautiful, cascading effect&#8221; one author Veeramachaneni says.<\/p>\n<p style=\"text-align: justify;\">But the system is not perfect at all. Only<strong> 85%<\/strong> percent of attacks are predicted in this system not 100%. Also the system produces <strong>4.4 %<\/strong> false positives. This is quite a lot if the system are used on billions of log-lines per day. A company need very good security experts which decide which event is an attack and which not. Every mistake is very risky and maybe leads to a security break.<\/p>\n<p style=\"text-align: justify;\">For more informations about the algorithm you can read <a href=\"https:\/\/people.csail.mit.edu\/kalyan\/AI2_Paper.pdf\">this <\/a>paper.<\/p>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Attacks against machine learning<br \/>\n<\/span><\/h2>\n<p style=\"text-align: justify;\">Keep in mind that hackers always search for security gaps in a network to break through the defense. If a system uses machine learning for defending the attackers maybe try to manipulate this algorithm or the data:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Poison attacks:<\/strong> Manipulate the data to change the decision boundary of the algorithm. In this case the machine learning algorithm thinks that an attack is a normal event.<\/li>\n<li><strong>Evasion attacks:<\/strong> If the attackers know the <span id=\"result_box\" class=\"short_text\" lang=\"en\"> <span class=\"alt-edited\">employed<\/span><\/span> algorithm they adjust the attack for this specific machine learning algorithm so that the algorithm can&#8217;t find the attack anymore.<\/li>\n<li><strong>Evolving attacks:<\/strong> In a dynamic machine learning algorithm all events are used as an input for the next training epoch. <span id=\"result_box\" class=\"short_text\" lang=\"en\">This creates an attack <span class=\"\">surface<\/span><\/span> if the attack pattern is changing slowly. A hacker could create many events to changes the decision boundary of the prediction task.<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Scientific questions<br \/>\n<\/span><\/h2>\n<p style=\"text-align: justify;\">The following scientific questions could be derived from this blog post:<\/p>\n<ul style=\"text-align: justify;\">\n<li>A big impact for a better result of machine learning algorithms are <strong>balanced classes<\/strong>. For this reason an algorithm for secure systems need round about 50% attacks and 50% normal events. To get more valid attacks the researchers could create a honey pot and try to collect more different attacks. Could this honey pot a chance to catch the attackers?<\/li>\n<li>More researchers can build new machine learning or deep learning algorithm for secure systems if companies create an <strong>open source repository<\/strong> with their network data for universities. So <span class=\"text\">academies<\/span> could offer courses in machine learning for secure systems. Maybe this create a new field of study with good educated experts?<\/li>\n<li>A big security risk is the high rate of <strong>wrong labels<\/strong>. What happens if an attack is labeled as a normal event by a security expert? One problem could be that a company trust the algorithm too much so that the damage of an cyber-attack is very high until the experts notice it.<\/li>\n<li>In a real world network an extreme large amount of events takes place in every <span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"\">second<\/span><\/span>. If an algorithm produces only 1% <strong>false positives <\/strong>are that still too much events. A company will not use an algorithm that throws this much critical events each second. So how handle this false positives?<\/li>\n<li>The presented machine learning pipeline needs data from the past. But what if a <strong>start-up<\/strong> like to use such an algorithm? Each company has a different network with different hard- and software. Is there a way to create a network-data independent machine learning pipeline? Maybe a software-as-a-service defense system based on machine learning?<\/li>\n<li>The algorithm learns attack pattern from already known attacks. In some cases this attacks are <span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"\">successful<\/span><\/span> and the company takes <strong>damage<\/strong>. What if machine learning is used to detect attacks before the system takes damage? An algorithm could detect <span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"\">user behavior and predict criminal actions before the attack takes place.<\/span><\/span><\/li>\n<li>Also a company can use machine learning to <strong>find security gaps<\/strong> in their own defense strategy. An algorithm can be used to attack the own system and explore the way to break through the defense boundary. After a gap is found the security experts could close it.<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Sources<\/span><\/h2>\n<ul>\n<li><strong>Paper &#8211; AI\u00b2 :<\/strong> <a href=\"https:\/\/people.csail.mit.edu\/kalyan\/AI2_Paper.pdf\">https:\/\/people.csail.mit.edu\/kalyan\/AI2_Paper.pdf<\/a><\/li>\n<li><strong>Paper &#8211; Machine learning security:<\/strong> <a href=\"http:\/\/people.eecs.berkeley.edu\/~tygar\/papers\/Machine_Learning_Security\/asiaccs06.pdf\">http:\/\/people.eecs.berkeley.edu\/~tygar\/papers\/Machine_Learning_Security\/asiaccs06.pdf<\/a><\/li>\n<li><strong>Paper &#8211; Machine learning identify a botnet:<\/strong> <a href=\"http:\/\/www.ir.bbn.com\/documents\/articles\/lcn-wns-06.pdf\">http:\/\/www.ir.bbn.com\/documents\/articles\/lcn-wns-06.pdf<\/a><\/li>\n<li><strong>Paper &#8211; Collection:<\/strong> <a href=\"https:\/\/www.ll.mit.edu\/mission\/cybersec\/publications\/Cyber-CompNetworkOps\/machine-learning-Security.html\">https:\/\/www.ll.mit.edu\/mission\/cybersec\/publications\/Cyber-CompNetworkOps\/machine-learning-Security.html<\/a><\/li>\n<li><strong>Research &#8211; McAfee Labs Threats Report March 2016:<\/strong> <a href=\"http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threats-mar-2016.pdf\">http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-quarterly-threats-mar-2016.pdf<\/a><\/li>\n<li><strong>Research &#8211; MIT News AI\u00b2:<\/strong> <a href=\"http:\/\/news.mit.edu\/2016\/ai-system-predicts-85-percent-cyber-attacks-using-input-human-experts-0418\">http:\/\/news.mit.edu\/2016\/ai-system-predicts-85-percent-cyber-attacks-using-input-human-experts-0418<\/a><\/li>\n<li><strong>Research &#8211; ML in Cyber Security:<\/strong> <a href=\"https:\/\/www.youtube.com\/watch?v=G2BydTwrrJk&amp;t=2778s\">https:\/\/www.youtube.com\/watch?v=G2BydTwrrJk&amp;t=2778s<\/a><\/li>\n<li><strong>Research &#8211; A dangerous Mix:<\/strong> <a href=\"http:\/\/resources.infosecinstitute.com\/cybersecurity-artificial-intelligence-dangerous-mix\/\">http:\/\/resources.infosecinstitute.com\/cybersecurity-artificial-intelligence-dangerous-mix\/<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Sadly today&#8217;s security systems often be hacked and sensitive informations get stolen. To protect a company against cyber-attacks security experts define a &#8220;rule set&#8221; to detect and prevent any attack. This \u201canalyst-driven solutions\u201d are build up from human experts with their domain knowledge. This knowledge is based on experiences and build for attacks of the [&hellip;]<\/p>\n","protected":false},"author":56,"featured_media":1116,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,652,26,651],"tags":[60,57,59,58],"ppma_author":[707],"class_list":["post-1017","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-artificial-intelligence","category-secure-systems","category-system-designs","tag-defence","tag-machine-learning","tag-mit","tag-secure-systems"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_robot_landscape.jpg","jetpack-related-posts":[{"id":10442,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/08\/19\/adversarial-attacks\/","url_meta":{"origin":1017,"position":0},"title":"The Dark Side of AI &#8211; Part 2: Adversarial Attacks","author":"Florian Wintel","date":"19. August 2020","format":false,"excerpt":"Find out how AI may become an attack vector! Could an attacker use your models against your? Also, what\u2019s the worst that could happen? Welcome to the domain of adversarial AI!","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fgsm_panda_image_preds_1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fgsm_panda_image_preds_1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fgsm_panda_image_preds_1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fgsm_panda_image_preds_1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fgsm_panda_image_preds_1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/fgsm_panda_image_preds_1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7327,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/08\/30\/about-the-robustness-of-machine-learning\/","url_meta":{"origin":1017,"position":1},"title":"About the Robustness of Machine Learning","author":"Marcel Heisler","date":"30. August 2019","format":false,"excerpt":"In the past couple of years research in the field of machine learning (ML) has made huge progress which resulted in applications like automated translation, practical speech recognition for smart assistants, useful robots, self-driving cars and lots of others. But so far we only have reached the point where ML\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"Glitch","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/glitch-2463363_1920.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/glitch-2463363_1920.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/glitch-2463363_1920.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/glitch-2463363_1920.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/glitch-2463363_1920.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/glitch-2463363_1920.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3221,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/03\/25\/security-in-a-saas-startup-and-todays-security-issues-with-devops\/","url_meta":{"origin":1017,"position":2},"title":"Security in a SaaS startup and today&#8217;s security issues with DevOps","author":"cp054","date":"25. March 2018","format":false,"excerpt":"Motivation Facing security in a company nowadays is a big job: it starts with a backup strategy ensuring the business continuation, plans for recovery after major breakdowns, ensuring physical security (entrance control, lock-pads, safes), screening of potential employees, monitoring servers, applications and workstations, training the employees in security issues and\u2026","rel":"","context":"In &quot;DevOps&quot;","block_context":{"text":"DevOps","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/devops\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10415,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/08\/19\/ai-cyberattacks-deepfakes\/","url_meta":{"origin":1017,"position":3},"title":"The Dark Side of AI &#8211; Part 1: Cyberattacks and Deepfakes","author":"Micha Christ","date":"19. August 2020","format":false,"excerpt":"Introduction Who hasn't seen a cinema production in which an AI-based robot threatens individual people or the entire human race? It is in the stars when or if such a technology can really be developed. With this series of blog entries we want to point out that AI does not\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/screen-shot-2018-08-03-at-10-34-32-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/screen-shot-2018-08-03-at-10-34-32-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/screen-shot-2018-08-03-at-10-34-32-1.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":2615,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/08\/27\/fooling-the-intelligence\/","url_meta":{"origin":1017,"position":4},"title":"FOOLING THE INTELLIGENCE","author":"Jonas Miederer","date":"27. August 2017","format":false,"excerpt":"Adversarial machine learning and its dangers The world is led by machines, humans are subjected to the robot\u2019s rule. Omniscient computer systems hold the control of the world. The newest technology has outpaced human knowledge, while the mankind is powerless in the face of the stronger, faster, better and almighty\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":902,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/22\/defense-in-depth-a-present-time-example\/","url_meta":{"origin":1017,"position":5},"title":"Defense in Depth: a present time example","author":"Benjamin Binder","date":"22. July 2016","format":false,"excerpt":"In this post, we want to take a look on the concept of defense in depth. Therefore we are going to examine Chrome OS, the niche operation system for web users.","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"Dark castle walls reaching in the sky","src":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg","width":350,"height":200,"srcset":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 1x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 1.5x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 2x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 3x, https:\/\/upload.wikimedia.org\/wikipedia\/commons\/3\/32\/Caernarfon_Castle_Walls.jpg 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":707,"user_id":56,"is_guest":0,"slug":"cm099","display_name":"Claudius Messerschmidt","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/09bf986356ccc56fe4c96d9d72f82dfcb0f400be45bf1912cec91efed1f845db?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=1017"}],"version-history":[{"count":36,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1017\/revisions"}],"predecessor-version":[{"id":25541,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1017\/revisions\/25541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media\/1116"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=1017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=1017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=1017"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=1017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}