SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
© 2012 Veloxiti™
Dark Web AI is bringing
Dark Web Intelligence to
your desktop
Ross Everett
Larry Lafferty
President and Chief
Executive Officer
at Veloxiti
IT and Project
Management Consultant
Moderated by:
Alex Buffington
ITPG Secure Compliance
EVP – Sales and
Operations
Larry Lafferty
Learn how
Intelligent agents
can work from
your desktop to
scan the dark web
for your stolen
data.
Artificial Intelligence is the science of
emulating human intelligence
■ Intelligence is generally viewed as the ability to:
▶ Sense and perceive
▶ Respond to situations flexibly
▶ Make sense out of ambiguous and contradictory information
▶ Recognize relative importance of different elements of situations
▶ Find similarities between situations despite differences
▶ Make rational decisions based on observations
■ We can apply a variety of AI techniques in a Dark Web strategy
Deep Neural Networks are a machine learning
technology
■ Neural Network objective is to solve a problem and
learn over time with increasing data input…
■ …by mimicking the brain function – specifically the
neuron/synapse model
■ Google’s face recognition capability is an example
Neural
Networks
DEFINITION:
An AI system that uses neuron paradigm of the brain to learn, find and
recognize patterns
Neural Networks are based on the neuron and
synapse structure of the human brain…
■ General brain architecture:
▶ Many (relatively) slow neurons, interconnected
▶ Dendrites serve as input devices (receive electrical impulses from other neurons)
▶ Cell body "sums" inputs from the dendrites (possibly inhibiting or exciting)
▶ If sum exceeds some threshold, the neuron fires an output impulse along axon
▶ Synapses connect axons and therefore connects neurons
■ Though brain neurons can only “fire” or “not fire” – representing a
“1” or a “0” – it is capable of processing amazing complexity
Neural
Networks
Layered neural networks are the basis for Deep
Learning
■ Some patterns cannot be recognized by single
perceptron layer
■ However, by adding additional layers of perceptrons, network can
develop complex feature detectors
■ For example, consider Optical character recognition (OCR)
Neural
Networks
Natural Language Processing is a kind of
machine learning
■ Deep understanding is still out of reach
■ However, NLP does enable us to
▶ Recognize entities – persons, places, things, organizations
▶ Recognize topics
▶ Perform sentiment analysis, include trends, changes in trends,
etc.
Natural
Language
Processing
DEFINITION:
NLP systems extract meaning from text
What about higher-level reasoning?
■ Intelligent Agents continuously perform several
functions:
▶ Perceive dynamic conditions in an environment
▶ Evaluate those conditions in light of a belief system
▶ When belief system reasons action must be taken…
▶ …either propose an action or initiate action in pursuit of a goal
(bounded authority)
Intelligent
Agent
DEFINITION:
An artificial intelligence system that can perceive its environment, interpret the
situation and make decisions in pursuit of accomplishing a goal
John Boyd’s OODA loop models dynamic
problem solving
■ Represents how an aviator can and should think about
situations
Intelligent
Agents
■ Continuous adaptation to continuously changing situations is the key
principle in Boyd’s OODA loop
What is the Dark Web?
■ Surface vs. Deep web
■ Dark web access methods
■ Botnets vs. Active Sites
■ Criminal Sites
Using the Dark Web for Defense
■ Crawlers
■ Offense informs Defense
■ Special talents on the Dark Web
■ Business Intelligence
What are We Searching For?
■ Markers
■ Hashing
■ Successive searches
The Dark Web as Part of a Strategy
■ The Dark Web can only do so much
■ Work with other groups and actors
■ Make sure you’re ready for bad news
DarkWebAI.com is developing a new tool for
leveraging the Dark Web

Mais conteúdo relacionado

Mais procurados

Neural Networks & Reservoir Computing: Computing Models for Mental States
Neural Networks & Reservoir Computing: Computing Models for Mental StatesNeural Networks & Reservoir Computing: Computing Models for Mental States
Neural Networks & Reservoir Computing: Computing Models for Mental StatesBali Hsu
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligencearpitnot4u
 
Machine Learning
Machine LearningMachine Learning
Machine Learningabhisek2016
 
Is Deep-Layered Machine Learning the Catalyst for an Artificial General Intel...
Is Deep-Layered Machine Learning the Catalyst for an Artificial General Intel...Is Deep-Layered Machine Learning the Catalyst for an Artificial General Intel...
Is Deep-Layered Machine Learning the Catalyst for an Artificial General Intel...Humanity Plus
 
Artificial Intelligence 2.0: Cognitive Mesh with Blockchain
Artificial Intelligence 2.0: Cognitive Mesh with BlockchainArtificial Intelligence 2.0: Cognitive Mesh with Blockchain
Artificial Intelligence 2.0: Cognitive Mesh with BlockchainBICA Labs
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceshihab mahmod
 
Arifical Intelligence
Arifical IntelligenceArifical Intelligence
Arifical IntelligenceTaimoor Riaz
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentationsweety seth
 
Artificial Intelligence for Business - Version 2
Artificial Intelligence for Business - Version 2Artificial Intelligence for Business - Version 2
Artificial Intelligence for Business - Version 2Nicola Mattina
 
Poster Presentation: An Investigation on Non-Invasive Brain-Computer Interfac...
Poster Presentation: An Investigation on Non-Invasive Brain-Computer Interfac...Poster Presentation: An Investigation on Non-Invasive Brain-Computer Interfac...
Poster Presentation: An Investigation on Non-Invasive Brain-Computer Interfac...Md Jobair Hossain Faruk
 
Shawn Riley on Artificial Intelligence
Shawn Riley on Artificial IntelligenceShawn Riley on Artificial Intelligence
Shawn Riley on Artificial IntelligenceShawn Riley
 

Mais procurados (19)

Soft computing
Soft computing Soft computing
Soft computing
 
Neural Networks & Reservoir Computing: Computing Models for Mental States
Neural Networks & Reservoir Computing: Computing Models for Mental StatesNeural Networks & Reservoir Computing: Computing Models for Mental States
Neural Networks & Reservoir Computing: Computing Models for Mental States
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Introduction to soft computing
 Introduction to soft computing Introduction to soft computing
Introduction to soft computing
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
artificial intelligence
artificial intelligence  artificial intelligence
artificial intelligence
 
Is Deep-Layered Machine Learning the Catalyst for an Artificial General Intel...
Is Deep-Layered Machine Learning the Catalyst for an Artificial General Intel...Is Deep-Layered Machine Learning the Catalyst for an Artificial General Intel...
Is Deep-Layered Machine Learning the Catalyst for an Artificial General Intel...
 
Cognitive computing
Cognitive computingCognitive computing
Cognitive computing
 
Artificial Intelligence 2.0: Cognitive Mesh with Blockchain
Artificial Intelligence 2.0: Cognitive Mesh with BlockchainArtificial Intelligence 2.0: Cognitive Mesh with Blockchain
Artificial Intelligence 2.0: Cognitive Mesh with Blockchain
 
Deep learning 1
Deep learning 1Deep learning 1
Deep learning 1
 
Deep learning
Deep learningDeep learning
Deep learning
 
Soft computing
Soft computingSoft computing
Soft computing
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Arifical Intelligence
Arifical IntelligenceArifical Intelligence
Arifical Intelligence
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentation
 
Artificial Intelligence for Business - Version 2
Artificial Intelligence for Business - Version 2Artificial Intelligence for Business - Version 2
Artificial Intelligence for Business - Version 2
 
Mind reading-computer
Mind reading-computerMind reading-computer
Mind reading-computer
 
Poster Presentation: An Investigation on Non-Invasive Brain-Computer Interfac...
Poster Presentation: An Investigation on Non-Invasive Brain-Computer Interfac...Poster Presentation: An Investigation on Non-Invasive Brain-Computer Interfac...
Poster Presentation: An Investigation on Non-Invasive Brain-Computer Interfac...
 
Shawn Riley on Artificial Intelligence
Shawn Riley on Artificial IntelligenceShawn Riley on Artificial Intelligence
Shawn Riley on Artificial Intelligence
 

Semelhante a Dark Web AI Desktop Tool Scans for Stolen Data

马赛PPT - DL & ML.pptx
马赛PPT - DL & ML.pptx马赛PPT - DL & ML.pptx
马赛PPT - DL & ML.pptxgptchat9867
 
Face Recognition - Deep Learning
Face Recognition - Deep LearningFace Recognition - Deep Learning
Face Recognition - Deep LearningAashish Chaubey
 
Deep Learnings Training.pptx
Deep Learnings Training.pptxDeep Learnings Training.pptx
Deep Learnings Training.pptxirfanakram32
 
Deep learning 1.0 and Beyond, Part 2
Deep learning 1.0 and Beyond, Part 2Deep learning 1.0 and Beyond, Part 2
Deep learning 1.0 and Beyond, Part 2Deakin University
 
Deep learning with tensorflow
Deep learning with tensorflowDeep learning with tensorflow
Deep learning with tensorflowCharmi Chokshi
 
Testing for the deeplearning folks
Testing for the deeplearning folksTesting for the deeplearning folks
Testing for the deeplearning folksVishwas N
 
What is Deep Learning.pptx
What is Deep Learning.pptxWhat is Deep Learning.pptx
What is Deep Learning.pptxtanyamudgal4
 
Deep Learning for AI - Yoshua Bengio, Mila
Deep Learning for AI - Yoshua Bengio, MilaDeep Learning for AI - Yoshua Bengio, Mila
Deep Learning for AI - Yoshua Bengio, MilaLucidworks
 
What is NOT machine learning - Burak Aybar
What is NOT machine learning - Burak AybarWhat is NOT machine learning - Burak Aybar
What is NOT machine learning - Burak AybarVisuality
 
Week1- Introduction.pptx
Week1- Introduction.pptxWeek1- Introduction.pptx
Week1- Introduction.pptxfahmi324663
 
ML-Chapter_one.pptx
ML-Chapter_one.pptxML-Chapter_one.pptx
ML-Chapter_one.pptxbelay41
 
Lunch and Learn Artificial intelligence
Lunch and Learn Artificial intelligence Lunch and Learn Artificial intelligence
Lunch and Learn Artificial intelligence The PNR
 
Artificial intelligence
Artificial intelligence Artificial intelligence
Artificial intelligence Muhammad Hamza
 
DEEP LEARNING BASED ON.pdf
DEEP LEARNING BASED ON.pdfDEEP LEARNING BASED ON.pdf
DEEP LEARNING BASED ON.pdftanyamudgal4
 
Deep learning and neural network converted
Deep learning and neural network convertedDeep learning and neural network converted
Deep learning and neural network convertedJanu Jahnavi
 

Semelhante a Dark Web AI Desktop Tool Scans for Stolen Data (20)

马赛PPT - DL & ML.pptx
马赛PPT - DL & ML.pptx马赛PPT - DL & ML.pptx
马赛PPT - DL & ML.pptx
 
Face Recognition - Deep Learning
Face Recognition - Deep LearningFace Recognition - Deep Learning
Face Recognition - Deep Learning
 
Deep Learnings Training.pptx
Deep Learnings Training.pptxDeep Learnings Training.pptx
Deep Learnings Training.pptx
 
Deep learning 1.0 and Beyond, Part 2
Deep learning 1.0 and Beyond, Part 2Deep learning 1.0 and Beyond, Part 2
Deep learning 1.0 and Beyond, Part 2
 
Deep learning with tensorflow
Deep learning with tensorflowDeep learning with tensorflow
Deep learning with tensorflow
 
Ml vs dl
Ml vs dlMl vs dl
Ml vs dl
 
Ml vs dl
Ml vs dlMl vs dl
Ml vs dl
 
Presentation v3
Presentation v3Presentation v3
Presentation v3
 
Deep learning
Deep learningDeep learning
Deep learning
 
Testing for the deeplearning folks
Testing for the deeplearning folksTesting for the deeplearning folks
Testing for the deeplearning folks
 
What is Deep Learning.pptx
What is Deep Learning.pptxWhat is Deep Learning.pptx
What is Deep Learning.pptx
 
Deep Learning for AI - Yoshua Bengio, Mila
Deep Learning for AI - Yoshua Bengio, MilaDeep Learning for AI - Yoshua Bengio, Mila
Deep Learning for AI - Yoshua Bengio, Mila
 
What is NOT machine learning - Burak Aybar
What is NOT machine learning - Burak AybarWhat is NOT machine learning - Burak Aybar
What is NOT machine learning - Burak Aybar
 
Week1- Introduction.pptx
Week1- Introduction.pptxWeek1- Introduction.pptx
Week1- Introduction.pptx
 
ML-Chapter_one.pptx
ML-Chapter_one.pptxML-Chapter_one.pptx
ML-Chapter_one.pptx
 
Deep Neural Networks (DNN)
Deep Neural Networks (DNN)Deep Neural Networks (DNN)
Deep Neural Networks (DNN)
 
Lunch and Learn Artificial intelligence
Lunch and Learn Artificial intelligence Lunch and Learn Artificial intelligence
Lunch and Learn Artificial intelligence
 
Artificial intelligence
Artificial intelligence Artificial intelligence
Artificial intelligence
 
DEEP LEARNING BASED ON.pdf
DEEP LEARNING BASED ON.pdfDEEP LEARNING BASED ON.pdf
DEEP LEARNING BASED ON.pdf
 
Deep learning and neural network converted
Deep learning and neural network convertedDeep learning and neural network converted
Deep learning and neural network converted
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Dark Web AI Desktop Tool Scans for Stolen Data

  • 1. © 2012 Veloxiti™ Dark Web AI is bringing Dark Web Intelligence to your desktop Ross Everett Larry Lafferty President and Chief Executive Officer at Veloxiti IT and Project Management Consultant Moderated by: Alex Buffington ITPG Secure Compliance EVP – Sales and Operations Larry Lafferty Learn how Intelligent agents can work from your desktop to scan the dark web for your stolen data.
  • 2. Artificial Intelligence is the science of emulating human intelligence ■ Intelligence is generally viewed as the ability to: ▶ Sense and perceive ▶ Respond to situations flexibly ▶ Make sense out of ambiguous and contradictory information ▶ Recognize relative importance of different elements of situations ▶ Find similarities between situations despite differences ▶ Make rational decisions based on observations ■ We can apply a variety of AI techniques in a Dark Web strategy
  • 3. Deep Neural Networks are a machine learning technology ■ Neural Network objective is to solve a problem and learn over time with increasing data input… ■ …by mimicking the brain function – specifically the neuron/synapse model ■ Google’s face recognition capability is an example Neural Networks DEFINITION: An AI system that uses neuron paradigm of the brain to learn, find and recognize patterns
  • 4. Neural Networks are based on the neuron and synapse structure of the human brain… ■ General brain architecture: ▶ Many (relatively) slow neurons, interconnected ▶ Dendrites serve as input devices (receive electrical impulses from other neurons) ▶ Cell body "sums" inputs from the dendrites (possibly inhibiting or exciting) ▶ If sum exceeds some threshold, the neuron fires an output impulse along axon ▶ Synapses connect axons and therefore connects neurons ■ Though brain neurons can only “fire” or “not fire” – representing a “1” or a “0” – it is capable of processing amazing complexity Neural Networks
  • 5. Layered neural networks are the basis for Deep Learning ■ Some patterns cannot be recognized by single perceptron layer ■ However, by adding additional layers of perceptrons, network can develop complex feature detectors ■ For example, consider Optical character recognition (OCR) Neural Networks
  • 6. Natural Language Processing is a kind of machine learning ■ Deep understanding is still out of reach ■ However, NLP does enable us to ▶ Recognize entities – persons, places, things, organizations ▶ Recognize topics ▶ Perform sentiment analysis, include trends, changes in trends, etc. Natural Language Processing DEFINITION: NLP systems extract meaning from text
  • 7. What about higher-level reasoning? ■ Intelligent Agents continuously perform several functions: ▶ Perceive dynamic conditions in an environment ▶ Evaluate those conditions in light of a belief system ▶ When belief system reasons action must be taken… ▶ …either propose an action or initiate action in pursuit of a goal (bounded authority) Intelligent Agent DEFINITION: An artificial intelligence system that can perceive its environment, interpret the situation and make decisions in pursuit of accomplishing a goal
  • 8. John Boyd’s OODA loop models dynamic problem solving ■ Represents how an aviator can and should think about situations Intelligent Agents ■ Continuous adaptation to continuously changing situations is the key principle in Boyd’s OODA loop
  • 9. What is the Dark Web? ■ Surface vs. Deep web ■ Dark web access methods ■ Botnets vs. Active Sites ■ Criminal Sites
  • 10. Using the Dark Web for Defense ■ Crawlers ■ Offense informs Defense ■ Special talents on the Dark Web ■ Business Intelligence
  • 11. What are We Searching For? ■ Markers ■ Hashing ■ Successive searches
  • 12. The Dark Web as Part of a Strategy ■ The Dark Web can only do so much ■ Work with other groups and actors ■ Make sure you’re ready for bad news DarkWebAI.com is developing a new tool for leveraging the Dark Web