Machine Learning in Cybersecurity: A Guide
• Technical Report
Publisher
Software Engineering Institute
CMU/SEI Report Number
CMU/SEI-2019-TR-005DOI (Digital Object Identifier)
10.1184/R1/12363089.v1Topic or Tag
Abstract
This report lists relevant questions that decision makers should ask of machine-learning practitioners before employing machine learning (ML) or artificial intelligence (AI) solutions in the area of cybersecurity. Like any tool, ML tools should be a good fit for the purpose they are intended to achieve. The questions in this report will improve decision makers’ ability to select an appropriate ML tool and make it a good fit to address their cybersecurity topic of interest. In addition, the report outlines the type of information that good answers to the questions should contain. This report covers the following questions:
- What is your topic of interest?
- What information will help you address the topic of interest?
- How do you anticipate that an ML tool will address the topic of interest?
- How will you protect the ML system against attacks in an adversarial, cybersecurity environment?
- How will you find and mitigate unintended outputs and effects?
- Can you evaluate the ML tool adequately, accounting for errors?
- What alternative tools have you considered? What are the advantages and disadvantages of each one?
Cite This Technical Report
Spring, J., Fallon, J., Galyardt, A., Horneman, A., Metcalf, L., & Stoner, E. (2019, September 5). Machine Learning in Cybersecurity: A Guide. (Technical Report CMU/SEI-2019-TR-005). Retrieved December 22, 2024, from https://doi.org/10.1184/R1/12363089.v1.
@techreport{spring_2019,
author={Spring, Jonathan and Fallon, Joshua and Galyardt, April and Horneman, Angela and Metcalf, Leigh and Stoner, Ed},
title={Machine Learning in Cybersecurity: A Guide},
month={{Sep},
year={{2019},
number={{CMU/SEI-2019-TR-005},
howpublished={Carnegie Mellon University, Software Engineering Institute's Digital Library},
url={https://doi.org/10.1184/R1/12363089.v1},
note={Accessed: 2024-Dec-22}
}
Spring, Jonathan, Joshua Fallon, April Galyardt, Angela Horneman, Leigh Metcalf, and Ed Stoner. "Machine Learning in Cybersecurity: A Guide." (CMU/SEI-2019-TR-005). Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, September 5, 2019. https://doi.org/10.1184/R1/12363089.v1.
J. Spring, J. Fallon, A. Galyardt, A. Horneman, L. Metcalf, and E. Stoner, "Machine Learning in Cybersecurity: A Guide," Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, Technical Report CMU/SEI-2019-TR-005, 5-Sep-2019 [Online]. Available: https://doi.org/10.1184/R1/12363089.v1. [Accessed: 22-Dec-2024].
Spring, Jonathan, Joshua Fallon, April Galyardt, Angela Horneman, Leigh Metcalf, and Ed Stoner. "Machine Learning in Cybersecurity: A Guide." (Technical Report CMU/SEI-2019-TR-005). Carnegie Mellon University, Software Engineering Institute's Digital Library, Software Engineering Institute, 5 Sep. 2019. https://doi.org/10.1184/R1/12363089.v1. Accessed 22 Dec. 2024.
Spring, Jonathan; Fallon, Joshua; Galyardt, April; Horneman, Angela; Metcalf, Leigh; & Stoner, Ed. Machine Learning in Cybersecurity: A Guide. CMU/SEI-2019-TR-005. Software Engineering Institute. 2019. https://doi.org/10.1184/R1/12363089.v1