skip to content

Inference from trees: Cybersecurity

Presented by: 
Thomas . GCHQ
Tuesday 16th March 2021 - 11:45 to 12:10
INI Seminar Room 1
Session Title: 
Understanding Clouds of Paths and Their Applications
Session Chair: 
Thomas Cass
In cybersecurity we want to detect malicious activity by finding unusual patterns of behaviour.  The logs of events on a system can be modelled as trees that evolve over time; the path signature provides a way to extract features from these trees by considering them as a collection of paths.  We can then use these features in machine learning techniques, to distinguish different types of behaviour.
University of Cambridge Research Councils UK
    Clay Mathematics Institute London Mathematical Society NM Rothschild and Sons