Using Machine Learning Techniques to Solve the IoT Security Problem

The scale and complexity of networks supporting IoT will quickly outstrip human capabilities to defend them. Devices can be elusive; they will hide behind gateways and roaming arrangements. The challenge is how to monitor and learn the behavior of the different classes of devices. IoT devices are like flocks of birds: they move in large groups in the same direction; when one deviates, usually the rest of the group deviates. We can use unsupervised machine learning techniques with a 5-step process to help solve the IoT Security problem. 1. Observe; 2. Cluster; 3. Detect Anomalies; 4. Root Cause Analysis; 5. Remediate.
Rob Lay, Cisco, discusses the results from the third annual Cisco AI Readiness Index. A small but...
Jackson Vo, President of Gridmatic Retail, discusses the pressures on Texas as a rapidly developing...
David Hurtado, Managing Director of Quetta Data Centers, discusses the impact of AI on the data...
Maxime Vermeir, Senior Director of AI Strategy at ABBYY, discusses the results from ABBYY’s State...
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues,...
Daniel Thorpe, JLL's Head of Data Center Research, EMEA, outlines the findings of the company’s...
Caroline Monfrais, Global VP Strategy & Transformation, Wipro Consulting, looks at, for all the...
Daniel Thorpe, JLL's Head of Data Center Research, EMEA, outlines the findings of the company’s...