CHAPTER 5

AI Solutions for Security

  • Discovery Phase
  • Detect Phase
  • Threat Score Phase
  • Threat Response Phase
  • Protect Phase
  • Monitor Phase
  • Conclusion
  • Firms in AI Cybersecurity

Chapter Outline

  • How to handle AI/ML models for security solutions

Key Learning Points

  • Learn and understand how AI/ML applies to security areas
  • Data preparation for
    • Input
    • Output
    • Training data
    • Validation data
  • Evaluate different algorithms

Image

Figure 5.1 Security AI process

Security AI Process

The artificial intelligence (AI) system being developed uses the following design approach:

  • Discovery phase
  • Detect phase
  • Threat score phase
  • Threat response phase
  • Protect phase
  • Monitor phase ...

Get Artificial Intelligence for Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.