A navigation system powered by machine learning is training robots to recognise objects – The Hindu

(Subscribe to our Today's Cache newsletter for a quick snapshot of top 5 tech stories. Click here to subscribe for free.)

Carnegie Mellon University (CMU) and Facebook AI Research (FAIR) have developed a semantic navigation system SemExp, to train robots to recognise objects, using machine learning.

Through SemExp, a robot is trained to differentiate between a kitchen table and an end table, while it is also able to understand where these objects are likely to be found. The process allows the navigation system to think strategically about how to search for something, said Devendra S. Chaplot, a Ph.D. student in CMU's Machine Learning Department, in a release.

Classical robotic navigation systems, explore a space by building a map showing obstacles. The robot eventually gets to where it needs to go, but the route can be circuitous. The system uses its semantic insights to determine the best places to look for a specific object, Chaplot added.

By making the system modular, the overall efficiency has gone up. The robots can now focus on learning the relationships between objects and room layouts. It also enables the robot to navigate its way from point A to point B, in the quickest possible manner.

Going forward a navigation technology like this could improve the interactions between people and robots. While a robot could bring an item in a particular place or it could find its way when directed, said a CMU release.

You have reached your limit for free articles this month.

To get full access, please subscribe.

Already have an account ? Sign in

Show Less Plan

Find mobile-friendly version of articles from the day's newspaper in one easy-to-read list.

Move smoothly between articles as our pages load instantly.

Enjoy reading as many articles as you wish without any limitations.

A one-stop-shop for seeing the latest updates, and managing your preferences.

A select list of articles that match your interests and tastes.

We brief you on the latest and most important developments, three times a day.

*Our Digital Subscription plans do not currently include the e-paper ,crossword, iPhone, iPad mobile applications and print. Our plans enhance your reading experience.

Excerpt from:
A navigation system powered by machine learning is training robots to recognise objects - The Hindu

inPowered Selected by ANA as Winner of ‘Best Use of AI/Machine Learning’ Category at 2020 B2 Awards – Yahoo Finance

Content Marketing Has an ROI Problem & AI Can Fix That

SAN FRANCISCO, July 28, 2020 /PRNewswire/ --inPowered, the AI platform delivering business outcomes with content marketing, was awarded the top honors for the "Best Use of AI/Machine Learning" categoryat the 2020 Association of National Advertiser's B2 Awards. This marks the first time that inPowered has received this accolade from the ANA, one of the most highly regarded organizations within the advertising and marketing space.

The entry, titled "Content Marketing has an ROI Problem & AI Can Solve That," discussed the current pain point surrounding measurement and ROI that continues to frustrate marketers. inPowered has challenged the industry standard of evaluating success based off "CPC" or "CPM" by inventing a new content economy to measure KPIs; one that concentrates on consumer engagement versus clicks and impressions. Powered by an artificial intelligence (AI) engine, inPowered's proprietary technology doesn't optimize for clicks but instead for interactions that last a minimum of 15 seconds with each piece of content. This focus on authentically engaged users allows data collected from the technology to guide consumers towards post-click engagement and next-action business outcomes; resulting in a digital funnel entirely optimized for achieving real results and establishing concrete key performance indicators at the lowest cost per engagement.

"Since inception our mission has been to deliver real business outcomes with content marketing, as opposed to the vanity metrics like clicks and impressions that come from display advertising," said Peyman Nilforoush, CEO and Co-Founder at inPowered."This award from the ANA highlights the enormous opportunity for brands to achieve real ROI with content marketing by utilizing AI-powered content distribution, instead of DSP's or ad-network buys that result in expensive costs per visit, low times on-site and high bounce rates from un-engaged users."

The Association of National Advertisers had their biggest year yet with submissions for the 2020 B2 Awards, receiving hundreds of entries across more than three dozen categories. As the largest & oldest marketing organization in the United States, the ANA's mission is to drive growth for marketing professionals, brands and businesses, and for the industry as a whole. "B2B marketing is a cornerstone of our industry, and these awards honor the best and the brightest in the business," said Bob Liodice, Chief Executive Officer at the ANA.

ABOUT INPOWERED:

inPowered is the AI platform built to deliver business outcomes with content marketing. Using inPowered's artificial intelligence-powered technology, brands are able to increase the ROI of their content marketing initiatives by optimizing advertising spend towards the lowest cost across channels; as well as placing calls to action at optimized times to convert already-engaged audiences into tangible business outcomes. The company was founded in 2014 by Peyman Nilforoush and Pirouz Nilforoush after selling their previous company to Ziff Davis. http://www.inpwrd.com

MEDIA CONTACT:

Chelsea Waite, Director of Communications(415) 968-9859chelsea.waite@inpwrd.com

Related Images

inpowered-logo.jpg inPowered Logo inPowered Logo

View original content to download multimedia:http://www.prnewswire.com/news-releases/inpowered-selected-by-ana-as-winner-of-best-use-of-aimachine-learning-category-at-2020-b2-awards-301101420.html

SOURCE inPowered

Read more:
inPowered Selected by ANA as Winner of 'Best Use of AI/Machine Learning' Category at 2020 B2 Awards - Yahoo Finance

Explorium, Augmenting Data Discovery for Better Predictions, Announces $31 Million in Funding to Accelerate Growth – AiThority

Explorium announced that it has secured an additional $31Min funding for its data science platform powered by automated data discovery. The Series B funding round was led by existing investorZeev Venturesand joined by ex-Twitter leaderships01 Advisorsand SirRonald CohensDynamic Loop, with the participation of seed investorsEmergeandF2 Capital.It brings Exploriums total funding to$50 million.

The greatest analytical challenge organizations will face over the next decade is finding the right data to feed their models and automated processes. The right data assets can make or break a company, or even propel a company to market leadership, saidMaor Shlomo, Co-Founder and CEO at Explorium. This is why we built Explorium to help companies discover the most relevant data assets out there, in an automated way. Were proud that our existing investors have doubled down on Explorium, and that new, world-renowned partners have joined them.

Recommended AI News: Alpha Sigma Capital Invests In Blockchain Social Media Platform Hyprr

Explorium empowers companies to build better predictive models by connecting their internal data to thousands of external data sources (including company, geospatial, behavioral, time-based, website data, and more), and then automatically uncovering hidden connections and generating custom signals and new data science features that make predictions more accurate. In doing this, the Explorium platform empowers data scientists by eliminating the barrier to acquire the right data, and business leaders by giving them the ability to make better decisions based on superior predictive power.

Since it announced its Series A funding last September, Explorium has tripled its customer base and expanded to incorporate data relevant to more industries and verticals. In addition to Exploriums Data Engine, either as a standalone product or integrated into its advanced data science platform, the company helps organizations through their machine learning and artificial intelligence transformations, by building models that impact the bottom line and create a competitive advantage.

Recent customers include online small-business lenderOnDeck, global media agencyCrossMedia,small business banking providerBlueVine,online eyewear retailerGlassesUSA,andsmall business loan providerBehalf.Explorium has also partnered with organizations includingAmazon Web Services, cloud data platformSnowflake, and data-driven strategy and consulting firmNova Consulting.

Recommended AI News: HashCash Extends Blockchain Support To Global Pharma Company For Clinical Trials

It was pure serendipity that I met Explorium; they are the greatest startup that Ive encountered over the last several years, saidNicolas Harl, General Manager atNova Consulting Groupand a former Senior Partner and Managing Director at Boston Consulting Group. Explorium is about breakthroughs breakthroughs in the search for external data for machine learning, breakthroughs in the search for the most relevant data for my model, breakthroughs in that its not a one-off, but a continuous process, and breakthroughs for our data ingestion, cleansing, and model monitoring. Explorium permanently searches for data enrichment and improvement, which perfectly fits in the current, uncertain climate and helps us to be permanently adaptive and push forward in our quest for constant improvement.

Explorium is our go-to partner for all things data, saidEinat Aviv, Data Science Director atBluevine. They provide automated access to a wide range of sources and impactful signals, complemented by a strong platform that generates a myriad of features that continually result in more accurate models, driving better business results. Explorium is a great partner and our first stop when developing a new model.

Oren Zeev, founding Partner atZeev Ventures, said Explorium represents a new category in the world of data science, and their success in winning both global brands and fast-growing startups as customers demonstrates that companies desperately need better data and the right tools to make use of it.

Adam Bain, Twitters former COO and Partner at01 Advisors, explained his decision to invest. When I first saw Explorium in action, I thought every company that uses data needs this. Its like an app store for predictive models; you throw them your model and it finds different data to make it work better. Its really that simple. Were excited to be a part of it, he said.

Explorium, founded inTel AvivbyMaor Shlomo,Or Tamir,andOmer Har, was named earlier this year asIsraelsmost promising early-stage Fintech startup by Citi accelerator, Intuit, and Visa for bringing superior external-data-driven predictive decision-making capabilities for the financial services industry. The company will use the new investment to continue its expansion to new business verticals and geographic markets, growing its data catalog and hiring more data science and commercial talent.

Recommended AI News: Yes, There Is A Huge Demand For Salesforce Marketing Cloud Experts: AiThority Interview With Susan Marshall, CEO Of Torchlite

Read the original here:
Explorium, Augmenting Data Discovery for Better Predictions, Announces $31 Million in Funding to Accelerate Growth - AiThority

inPowered Selected by ANA as Winner of ‘Best Use of AI/Machine Learning’ Category at 2020 B2 Awards – PRNewswire

SAN FRANCISCO, July 28, 2020 /PRNewswire/ --inPowered, the AI platform delivering business outcomes with content marketing, was awarded the top honors for the "Best Use of AI/Machine Learning" categoryat the 2020 Association of National Advertiser's B2 Awards. This marks the first time that inPowered has received this accolade from the ANA, one of the most highly regarded organizations within the advertising and marketing space.

The entry, titled "Content Marketing has an ROI Problem & AI Can Solve That," discussed the current pain point surrounding measurement and ROI that continues to frustrate marketers. inPowered has challenged the industry standard of evaluating success based off "CPC" or "CPM" by inventing a new content economy to measure KPIs; one that concentrates on consumer engagement versus clicks and impressions. Powered by an artificial intelligence (AI) engine, inPowered's proprietary technology doesn't optimize for clicks but instead for interactions that last a minimum of 15 seconds with each piece of content. This focus on authentically engaged users allows data collected from the technology to guide consumers towards post-click engagement and next-action business outcomes; resulting in a digital funnel entirely optimized for achieving real results and establishing concrete key performance indicators at the lowest cost per engagement.

"Since inception our mission has been to deliver real business outcomes with content marketing, as opposed to the vanity metrics like clicks and impressions that come from display advertising," said Peyman Nilforoush, CEO and Co-Founder at inPowered."This award from the ANA highlights the enormous opportunity for brands to achieve real ROI with content marketing by utilizing AI-powered content distribution, instead of DSP's or ad-network buys that result in expensive costs per visit, low times on-site and high bounce rates from un-engaged users."

The Association of National Advertisers had their biggest year yet with submissions for the 2020 B2 Awards, receiving hundreds of entries across more than three dozen categories. As the largest & oldest marketing organization in the United States, the ANA's mission is to drive growth for marketing professionals, brands and businesses, and for the industry as a whole. "B2B marketing is a cornerstone of our industry, and these awards honor the best and the brightest in the business," said Bob Liodice, Chief Executive Officer at the ANA.

ABOUT INPOWERED:

inPowered is the AI platform built to deliver business outcomes with content marketing. Using inPowered's artificial intelligence-powered technology, brands are able to increase the ROI of their content marketing initiatives by optimizing advertising spend towards the lowest cost across channels; as well as placing calls to action at optimized times to convert already-engaged audiences into tangible business outcomes. The company was founded in 2014 by Peyman Nilforoush and Pirouz Nilforoush after selling their previous company to Ziff Davis. http://www.inpwrd.com

MEDIA CONTACT:

Chelsea Waite, Director of Communications(415) 968-9859[emailprotected]

Related Images

inpowered-logo.jpg inPowered Logo inPowered Logo

SOURCE inPowered

http://www.inpwrd.com

Continue reading here:
inPowered Selected by ANA as Winner of 'Best Use of AI/Machine Learning' Category at 2020 B2 Awards - PRNewswire

Robotic Human-Like Inspection Unit Has AI-Based Machine Learning Capabilities – Packaging Strategies

Robotic Human-Like Inspection Unit Has AI-Based Machine Learning Capabilities | 2020-07-28 | Packaging Strategies This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.

Read the original:
Robotic Human-Like Inspection Unit Has AI-Based Machine Learning Capabilities - Packaging Strategies

New Machine Learning Features, Data Integrations, and Upgraded Classification Engines Available in Grooper Version 2.9 – PRNewswire

OKLAHOMA CITY, July 28, 2020 /PRNewswire/ --Grooper, the leading intelligent document processing and digital data integration platform announces the release of version 2.9. Included are fourteen new capabilities that enhance machine learning, classification, separation, data integration, and reporting.

New Machine Learning FeaturesMachine learning is easier and more powerful. The new Rebuild Training features provide tuning and A/B testing using identical training sets and document training decisions.

Integration with BoxBuilt-in integration with Box.com enables file import and export, metadata mapping, data lookups, and more.

Advanced Document ClassificationTackle complicated document sets with advanced classification strategies. Target documents within or across groups that are lexically dissimilar or similar with high accuracy.

New Document ViewerUsers can choose from multiple document renditions to build better data extractions.

Improved Document SeparationDocument separation is now more robust and accurate due to new auto-separation logic. New page extractors separate unstructured documents.

Enhanced Database ExportDefine multiple exports on a single export step within a single database or spanning multiple tables. Multipart database exports are simplified and SQL server-generated identity columns are supported.

CMIS Data LookupsPopulate and validate data fields based on queryable metadata located on CMIS objects.

New Data Annotation Option in Data ReviewExtracted document data is now displayed at the extraction location on the document. This speeds up human data review and includes multiple configurable properties.

Content Type FilteringNow users can enable classification, extraction, and review to proceed in stages for larger more complicated projects.

Compile Stats FeatureThe Compile Stats feature provides comprehensive statistics on classification and extraction activities to assist administrators in developing and troubleshooting advanced content models.

Learn more about Grooper visit http://www.grooper.com.

About GrooperGrooper was built from the ground up by BIS, a company with 35 years of continuous experience developing and delivering new technology. Grooper is an intelligent document processing and digital data integration solution that empowers organizations to extract meaningful information from paper/electronic documents and other forms of unstructured data.

The platform combines patented and sophisticated image processing, capture technology, machine learning, natural language processing, and optical character recognition to enrich and embed human comprehension into data. By tackling tough challenges that other systems cannot resolve, Grooper has become the foundation for many industry-first solutions in healthcare, financial services, oil and gas, education, and government.

SOURCE Grooper

http://www.grooper.com

See more here:
New Machine Learning Features, Data Integrations, and Upgraded Classification Engines Available in Grooper Version 2.9 - PRNewswire

Global AI/Machine Learning Market 2020 Trends, Demand and Scope with Outlook, Business Strategies and Forecast 2025 – Market Research Correspondent

The most recent report titled Global AI/Machine Learning Market 2020 by Company, Type and Application, Forecast to 2025 issued by MarketsandResearch.biz fetches a scheduled analysis of the market covering historical data and forecast remuneration about the market. The report sheds light on numerous aspects of the current market scenario such as supply chain operations, new product development, and other activities. The report talks about major players and regions, recent developments, and competitive landscape of the global AI/Machine Learning market. Our team of an analyst is watching continuously the market movement, market drivers, offers real-time analysis regarding growth, decline as well as hurdles, opportunities, and challenges faced by the major players in the global market.

Key Players:

The high growth potential of the market has reassured several players to participate in the market and create a niche for themselves. The report includes an accurate analysis of key players with market value, company profile, and SWOT analysis. The report also includes manufacturing cost analysis mainly included raw materials analysis, the price trend of product, mergers & acquisitions, expansion, key suppliers of the product, concentration rate of AI/Machine Learning market, manufacturing process analysis. Almost all companies who are listed or profiled are being to upgrade their applications for end-user experience and setting up their permanent base in 2020.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketsandresearch.biz/sample-request/77751

NOTE: Our analysts monitoring the situation across the globe explains that the market will generate remunerative prospects for producers post COVID-19 crisis. The report aims to provide an additional illustration of the latest scenario, economic slowdown, and COVID-19 impact on the overall industry.

This report focused and concentrates on these companies including: GOOGLE, PINTEREST, SOUNDHOUND, IBM, IRIS AI, BAIDU, DESCARTES LABS, PRISMA, ZEBRA MEDICAL VISION, TRADEMARKVISION, Amazon

Furthermore, the research contributes an in-depth overview of regional level break-up categorized as likely leading growth rate territory, countries with the highest market share in past and current scenario. Some of the geographical break-up incorporated in the study are: North America (United States, Canada and Mexico), Europe (Germany, France, United Kingdom, Russia and Italy), Asia-Pacific (China, Japan, Korea, India, Southeast Asia and Australia), South America (Brazil, Argentina), Middle East & Africa (Saudi Arabia, UAE, Egypt and South Africa)

Market segment by product type, split into TensorFlow, Caffe2, Apache MXNet, etc. along with their consumption (sales), market share and growth rate

Market segment by application, split into Automotive, Santific Research, Big Date, Other along with their consumption (sales), market share and growth rate

ACCESS FULL REPORT: https://www.marketsandresearch.biz/report/77751/global-aimachine-learning-market-2020-by-company-type-and-application-forecast-to-2025

Research Objectives and Purpose:

Moreover, the market is segmented on the basis of product type, application, and end-user. The report gives a first-time present and attentive analysis of the size, patterns, production, and supply of AI/Machine Learning. The report aims to help companies in strategizing their decisions in a better way and finally attain their business goals. The analysts also identify significant trends, drivers, influence factors in global and regions.

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team ([emailprotected]), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

About Us

Marketsandresearch.biz is a leading global Market Research agency providing expert research solutions, trusted by the best. We understand the importance of knowing what global consumers watch and buy, further using the same to document our distinguished research reports. Marketsandresearch.biz has worldwide presence to facilitate real market intelligence using latest methodology, best-in-class research techniques and cost-effective measures for worlds leading research professionals and agencies. We study consumers in more than 100 countries to give you the most complete view of trends and habits worldwide. Marketsandresearch.biz is a leading provider of Full-Service Research, Global Project Management, Market Research Operations and Online Panel Services.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: [emailprotected]Web: http://www.marketsandresearch.biz

Go here to read the rest:
Global AI/Machine Learning Market 2020 Trends, Demand and Scope with Outlook, Business Strategies and Forecast 2025 - Market Research Correspondent

Facebooks Red Team Hacks Its Own AI Programs – WIRED

In 2018, Canton organized a risk-a-thon in which people from across Facebook spent three days competing to find the most striking way to trip up those systems. Some teams found weaknesses that Canton says convinced him the company needed to make its AI systems more robust.

One team at the contest showed that using different languages within a post could befuddle Facebooks automated hate-speech filters. A second discovered the attack used in early 2019 to spread porn on Instagram, but it wasnt considered an immediate priority to fix at the time. We forecast the future, Canton says. That inspired me that this should be my day job.

In the past year, Cantons team has probed Facebooks moderation systems. It also began working with another research team inside the company that has built a simulated version of Facebook called WW that can be used as a virtual playground to safely study bad behavior. One project is examining the circulation of posts offering goods banned on the social network, such as recreational drugs.

The red teams weightiest project aims to better understand deepfakes, imagery generated using AI that looks like it was captured with a camera. The results show that preventing AI trickery isnt easy.

Deepfake technology is becoming easier to access and has been used for targeted harassment. When Cantons group formed last year, researchers had begun to publish ideas for how to automatically filter out deepfakes. But he found some results suspicious. There was no way to measure progress, he says. Some people were reporting 99 percent accuracy, and we were like That is not true.

Facebooks AI red team launched a project called the Deepfakes Detection Challenge to spur advances in detecting AI-generated videos. It paid 4,000 actors to star in videos featuring a variety of genders, skin tones, and ages. After Facebook engineers turned some of the clips into deepfakes by swapping peoples faces around, developers were challenged to create software that could spot the simulacra.

The results, released last month, show that the best algorithm could spot deepfakes not in Facebooks collection only 65 percent of the time. That suggests Facebook isnt likely to be able to reliably detect deepfakes soon. Its a really hard problem, and its not solved, Canton says.

Cantons team is now examining the robustness of Facebook's misinformation detectors and political ad classifiers. Were trying to think very broadly about the pressing problems in the upcoming elections, he says.

Most companies using AI in their business dont have to worry as Facebook does about being accused of skewing a presidential election. But Ram Shankar Siva Kumar, who works on AI security at Microsoft, says they should still worry about people messing with their AI models. He contributed to a paper published in March that found 22 of 25 companies queried did not secure their AI systems at all. The bulk of security analysts are still wrapping their head around machine learning, he says. Phishing and malware on the box is still their main thing.

Last fall Microsoft released documentation on AI security developed in partnership with Harvard that the company uses internally to guide its security teams. It discusses threats such as model stealing, where an attacker sends repeated queries to an AI service and uses the responses to build a copy that behaves similarly. That stolen copy can either be put to work directly or used to discover flaws that allow attackers to manipulate the original, paid service.

Battista Biggio, a professor at the University of Cagliari who has been publishing studies on how to trick machine-learning systems for more than a decade, says the tech industry needs to start automating AI security checks.

Companies use batteries of preprogrammed tests to check for bugs in conventional software before it is deployed. Biggio says improving the security of AI systems in use will require similar tools, potentially building on attacks he and others have demonstrated in academic research.

That could help address the gap Kumar highlights between the numbers of deployed machine-learning algorithms and the workforce of people knowledgeable about their potential vulnerabilities. However, Biggio says biological intelligence will still be needed, since adversaries will keep inventing new tricks. The human in the loop is still going to be an important component, he says.

More Great WIRED Stories

The rest is here:
Facebooks Red Team Hacks Its Own AI Programs - WIRED

Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection – Microsoft

The application of deep learning and other machine learning methods to threat detection on endpoints, email and docs, apps, and identities drives a significant piece of the coordinated defense delivered by Microsoft Threat Protection. Within each domain as well as across domains, machine learning plays a critical role in analyzing and correlating massive amounts of data to detect increasingly evasive threats and build a complete picture of attacks.

On endpoints, Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) detects malware and malicious activities using various types of signals that span endpoint and network behaviors. Signals are aggregated and processed by heuristics and machine learning models in the cloud. In many cases, the detection of a particular type of behavior, such as registry modification or a PowerShell command, by a single heuristic or machine learning model is sufficient to create an alert.

Detecting more sophisticated threats and malicious behaviors considers a broader view and is significantly enhanced by fusion of signals occurring at different times. For example, an isolated event of file creation is generally not a very good indication of malicious activity, but when augmented with an observation that a scheduled task is created with the same dropped file, and combined with other signals, the file creation event becomes a significant indicator of malicious activity. To build a layer for these kinds of abstractions, Microsoft researchers instrumented new types of signals that aggregate individual signals and create behavior-based detections that can expose more advanced malicious behavior.

In this blog, we describe an application of deep learning, a category of machine learning algorithms, to the fusion of various behavior detections into a decision-making model. Since its deployment, this deep learning model has contributed to the detection of many sophisticated attacks and malware campaigns. As an example, the model uncovered a new variant of the Bondat worm that attempts to turn affected machines into zombies for a botnet. Bondat is known for using its network of zombie machines to hack websites or even perform cryptocurrency mining. This new version spreads using USB devices and then, once on a machine, achieves a fileless persistence. We share more technical details about this attack in latter sections, but first we describe the detection technology that caught it.

Identifying and detecting malicious activities within massive amounts of data processed by Microsoft Defender ATP require smart automation methods and AI. Machine learning classifiers digest large volumes of historical data and apply automatically extracted insights to score each new data point as malicious or benign. Machine learning-based models may look at, for example, registry activity and produce a probability score, which indicates the probability of the registry write being associated with malicious activity. To tie everything together, behaviors are structured into virtual process trees, and all signals associated with each process tree are aggregated and used for detecting malicious activity.

With virtual process trees and signals of different types associated to these trees, there are still large amounts of data and noisy signals to sift through. Since each signal occurs in the context of a process tree, its necessary to fuse these signals in the chronological order of execution within the process tree. Data ordered this way requires a powerful model to classify malicious vs. benign trees.

Our solution comprises several deep learning building blocks such as Convolutional Neural Networks (CNNs) and Long Short-Term Memory Recurrent Neural Networks (LSTM-RNN). The neural network can take behavior signals that occur chronologically in the process tree and treat each batch of signals as a sequence of events. These sequences can be collected and classified by the neural network with high precision and detection coverage.

Microsoft Defender ATP researchers instrument a wide range of behavior-based signals. For example, a signal can be for creating an entry in the following registry key:

HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun

A folder and executable file name added to this location automatically runs after the machine starts. This generates persistence on the machine and hence can be considered an indicator of compromise (IoC). Nevertheless, this IoC is generally not enough to generate detection because legitimate programs also use this mechanism.

Another example of behavior-based signal is service start activity. A program that starts a service through the command line using legitimate tools like net.exe is not considered a suspicious activity. However, starting a service created earlier by the same process tree to obtain persistence is an IoC.

On the other hand, machine learning-based models look at and produce signals on different pivots of a possible attack vector. For example, a machine learning model trained on historical data to discern between benign and malicious command lines will produce a score for each processed command line.

Consider the following command line:

cmd /c taskkill /f /im someprocess.exe

This line implies that taskill.exe is evoked by cmd.exe to terminate a process with a particular name. While the command itself is not necessarily malicious, the machine learning model may be able to recognize suspicious patterns in the name of the process being terminated, and provide a maliciousness probability, which is aggregated with other signals in the process tree. The result is a sequence of events during a certain period of time for each virtual process tree.

The next step is to use a machine learning model to classify this sequence of events.

The sequences of events described in the previous sections can be represented in several different ways to then be fed into machine learning models.

The first and simple way is to construct a dictionary of all possible events, and to assign a unique identifier (index) to each event in the dictionary. This way, a sequence of events is represented by a vector, where each slot constitutes the number of occurrences (or other related measure) for an event type in the sequence.

For example, if all possible events in the system are X,Y, and Z, a sequence of events X,Z,X,X is represented by the vector [3, 0, 1], implying that it contains three events of type X, no events of type Y, and a single event of type Z. This representation scheme, widely known as bag-of-words, is suitable for traditional machine learning models and has been used for a long time by machine learning practitioners. A limitation of the bag-of-words representation is that any information about the order of events in the sequence is lost.

The second representation scheme is chronological. Figure 1 shows a typical process tree: Process A raises an event X at time t1, Process B raises an event Z at time t2, D raises X at time t3, and E raises X at time t4. Now the entire sequence X,Z,X,X (or [1,3,1,1] replacing events by their dictionary indices) is given to the machine learning model.

Figure 1. Sample process tree

In threat detection, the order of occurrence of different events is important information for the accurate detection of malicious activity. Therefore,its desirable to employ a representation scheme that preserves the order of events, as well as machine learning models that are capable of consuming such ordered data. This capability can be found in the deep learning models described in the next section.

Deep learning has shown great promise in sequential tasks in natural language processing like sentiment analysis and speech recognition. Microsoft Defender ATP uses deep learning for detecting various attacker techniques, including malicious PowerShell.

For the classification of signal sequences, we use a Deep Neural Network that combines two types of building blocks (layers): Convolutional Neural Networks (CNN) and Bidirectional Long Short-Term Memory Recurrent Neural Networks (BiLSTM-RNN).

CNNs are used in many tasks relating to spatial inputs such as images, audio, and natural language. A key property of CNNs is the ability to compress a wide-field view of the input into high-level features. When using CNNs in image classification, high-level features mean parts of or entire objects that the network can recognize. In our use case, we want to model long sequences of signals within the process tree to create high-level and localized features for the next layer of the network. These features could represent sequences of signals that appear together within the data, for example, create and run a file, or save a file and create a registry entry to run the file the next time the machine starts. Features created by the CNN layers are easier to digest for the ensuing LSTM layer because of this compression and featurization.

LSTM deep learning layers are famous for results in sentence classification, translation, speech recognition, sentiment analysis, and other sequence modeling tasks. Bidirectional LSTM combine two layers of LSTMs that process the sequence in opposite directions.

The combination of the two types of neural networks stacked one on top of the other has shown to be very effective and can classify long sequences of hundreds of items and more. The final model is a combination of several layers: one embedding layer, two CNNs, and a single BiLSTM. The input to this model is a sequence of hundreds of integers representing the signals associated with a single process tree during a unit of time. Figure 2 shows the architecture of our model.

Figure 2. CNN-BiLSTM model

Since the number of possible signals in the system is very high, input sequences are passed through an embedding layer that compresses high-dimensional inputs into low-dimensional vectors that can be processed by the network. In addition, similar signals get a similar vector in lower-dimensional space, which helps with the final classification.

Initial layers of the network create increasingly high-level features, and the final layer performs sequence classification. The output of the final layer is a score between 0 and 1 that indicates the probability of the sequence of signals being malicious. This score is used in combination with other models to predict if the process tree is malicious.

Microsoft Defender ATPs endpoint detection and response capabilities use this Deep CNN-BiLSTM model to catch and raise alerts on real-world threats. As mentioned, one notable attack that this model uncovered is a new variant of the Bondat worm, which was seen propagating in several organizations through USB devices.

Figure 3. Bondat malware attack chain

Even with an arguably inefficient propagation method, the malware could persist in an organization as users continue to use infected USB devices. For example, the malware was observed in hundreds of machines in one organization. Although we detected the attack during the infection period, it continued spreading until all malicious USB drives were collected. Figure 4 shows the infection timeline.

Figure 4. Timeline of encounters within a single organization within a period of 5 months showing reinfection through USB devices

The attack drops a JavaScript payload, which it runs directly in memory using wscript.exe. The JavaScript payload uses a randomly generated filename as a way to evade detections. However, Antimalware Scan Interface (AMSI) exposes malicious script behaviors.

To spread via USB devices, the malware leverages WMI to query the machines disks by calling SELECT * FROM Win32_DiskDrive. When it finds a match for /usb (see Figure 5), it copies the JavaScript payload to the USB device and creates a batch file on the USB devices root folder. The said batch file contains the execution command for the payload. As part of its social engineering technique to trick users into running the malware in the removable device, it creates a LNK file on the USB pointing to the batch file.

Figure 5. Infection technique

The malware terminates processes related to antivirus software or debugging tools. For Microsoft Defender ATP customers, tamper protection prevents the malware from doing this. Notably, after terminating a process, the malware pops up a window that imitates a Windows error message to make it appear like the process crashed (See figure 6).

Figure 6. Evasion technique

The malware communicates with a remote command-and-control (C2) server by implementing a web client (MSXML). Each request is encrypted with RC4 using a randomly generated key, which is sent within the PHPSESSID cookie value to allow attackers to decrypt the payload within the POST body.

Every request sends information about the machine and its state following the output of the previously executed command. The response is saved to disk and then parsed to extract commands within an HTML comment tag. The first five characters from the payload are used as key to decrypt the data, and the commands are executed using the eval() method. Figures 7 and 8 show the C2 communication and HTML comment eval technique.

Once the command is parsed and evaluated by the JavaScript engine, any code can be executed on an affected machine, for example, download other payloads, steal sensitive info, and exfiltrate stolen data. For this Bondat campaign, the malware runs coin mining or coordinated distributed denial of service (DDoS) attacks.

Figure 7. C2 communication

Figure 8. Eval technique (parsing commands from html comment)

The malwares activities triggered several signals throughout the attack chain. The deep learning model inspected these signals and the sequence with which they occurred, and determined that the process tree was malicious, raising an alert:

Modeling a process tree, given different signals that happen at different times, is a complex task. It requires powerful models that can remember long sequences and still be able to generalize well enough to churn out high-quality detections. The Deep CNN-BiLSTM model we discussed in this blog is a powerful technology that helps Microsoft Defender ATP achieve this task. Today, this deep learning-based solution contributes to Microsoft Defender ATPs capability to detect evolving threats like Bondat.

Microsoft Defender ATP raises alerts for these deep learning-driven detections, enabling security operations teams to respond to attacks using Microsoft Defender ATPs other capabilities, like threat and vulnerability management, attack surface reduction, next-generation protection, automated investigation and response, and Microsoft Threat Experts. Notably, these alerts inform behavioral blocking and containment capabilities, which add another layer of protection by blocking threats if they somehow manage to start running on machines.

The impact of deep learning-based protections on endpoints accrues to the broader Microsoft Threat Protection (MTP), which combines endpoint signals with threat data from email and docs, identities, and apps to provide cross-domain visibility. MTP harnesses the power of Microsoft 365 security products to deliver unparalleled coordinated defense that detects, blocks, remediates, and prevents attacks across an organizations Microsoft 365 environment. Through machine learning and AI technologies like the deep-learning model we discussed in this blog, MTP automatically analyzes cross-domain data to build a complete picture of each attack, eliminating the need for security operations centers (SOC) to manually build and track the end-to-end attack chain and relevant details. MTP correlates and consolidates attack evidence into incidents, so SOCs can save time and focus on critical tasks like expanding investigations and proacting threat hunting.

Arie Agranonik, Shay Kels, Guy Arazi

Microsoft Defender ATP Research Team

Questions, concerns, or insights on this story? Join discussions at the Microsoft Threat Protection and Microsoft Defender ATP tech communities.

Read all Microsoft security intelligence blog posts.

Follow us on Twitter @MsftSecIntel.

Go here to read the rest:
Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection - Microsoft

Machine Learning as a Service Market: Assessing the Fallout From the Coronavirus Pandemic – Market Research Posts

Machine Learning as a Service Market report covers the Introduction, Product Type and Application, Market Overview, Market Analysis by Countries, Market Opportunities, Market Risk and Market Driving Force. Under Coronavirus (COVID19) outbreak globally, this Machine Learning as a Service industry report provides 360 degrees of analysis from Supply Chain, Import and Export control to regional government policy and future influence on the industry.Focuses on the topmost key Machine Learning as a Service market manufactures/players like(Amazon, Oracle Corporation, IBM, Microsoft Corporation, Google Inc., Salesforce.Com, Tencent, Alibaba, UCloud, Baidu, Rackspace, SAP AG, Century Link Inc., CSC (Computer Science Corporation), Heroku, Clustrix, Xeround), to define, describe and analyze the Sales Volume, Value, Market Share, Capacity, Production, Price, Revenue, Cost, Gross, Gross Margin, Machine Learning as a Service Market Competition Landscape, SWOT Analysis and Development Plans in next few years.

Get Free Sample PDF (including COVID19 Impact Analysis, full TOC, Tables and Figures)of Machine Learning as a Service[emailprotected]https://www.researchmoz.us/enquiry.php?type=S&repid=2302143

Which Prime Data Figures are Included in This Machine Learning as a Service Market Report-Market size (Last few years, current and expected); Market share analysis as per different companies; Machine Learning as a Service Market forecast; Demand; Price Analysis; Machine Learning as a Service Market Contributions (Size, Share as per regional boundaries).

Scope of Machine Learning as a Service Market:Machine learning is a field of artificial intelligence that uses statistical techniques to give computer systems the ability to learn (e.g., progressively improve performance on a specific task) from data, without being explicitly programmed.

On the basis on the end users/applications,this report focuses on the status and outlook for major applications/end users, shipments, revenue (Million USD), price, and market share and growth rate foreach application.

Personal Business

On the basis of product type, this report displays the shipments, revenue (Million USD), price, and market share and growth rate of each type.

Private clouds Public clouds Hybrid cloud

Do You Have Any Query Or Specific Requirement? Ask to Our Industry[emailprotected]https://www.researchmoz.us/enquiry.php?type=E&repid=2302143

Machine Learning as a Service Market Regional Analysis Covers:

Some Important Highlights From The Machine Learning as a Service Market Report Include:

To Get Discount of Machine Learning as a Service Market:https://www.researchmoz.us/enquiry.php?type=D&repid=2302143

Contact:

ResearchMozMr. Rohit Bhisey,Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email:[emailprotected]

Browse More Reports Visit @https://www.mytradeinsight.blogspot.com/

View original post here:
Machine Learning as a Service Market: Assessing the Fallout From the Coronavirus Pandemic - Market Research Posts