Inference from trees: Cybersecurity

26 mins 26 secs,  82.25 MB,  iPod Video  480x270,  25.0 fps,  44100 Hz,  424.84 kbits/sec
Share this media item:
Embed this media item:


About this item
media item has no image
Description: Thomas
Tuesday, March 16, 2021 - 11:45 to 12:10
 
Created: 2021-03-17 12:51
Collection: Unlocking Data Streams
Publisher: Isaac Newton Institute
Copyright: Thomas
Language: eng (English)
Distribution: World     (downloadable)
Explicit content: No
Aspect Ratio: 16:9
Screencast: No
Bumper: UCS Default
Trailer: UCS Default
 
Abstract: In cybersecurity we want to detect malicious activity by finding unusual patterns of behaviour. The logs of events on a system can be modelled as trees that evolve over time; the path signature provides a way to extract features from these trees by considering them as a collection of paths. We can then use these features in machine learning techniques, to distinguish different types of behaviour.
Available Formats
Format Quality Bitrate Size
MPEG-4 Video 640x360    223.99 kbits/sec 43.37 MB View Download
WebM 640x360    189.27 kbits/sec 36.67 MB View Download
iPod Video * 480x270    424.84 kbits/sec 82.25 MB View Download
MP3 44100 Hz 249.81 kbits/sec 48.43 MB Listen Download
Auto (Allows browser to choose a format it supports)