<<<<<<< HEAD ======= >>>>>>> 8cd7dda (Initial Push)
3rd Workshop on
Machine Learning for CyberSecurity
<<<<<<< HEAD
Co-located with ECMLPKDD 2021
September 13, 2021 - Bilbao, Spain
=======
Co-located with ECMLPKDD 2021
September 13, 2021 - Bilbao, Spain
>>>>>>> 8cd7dda (Initial Push) About the workshop

About MLCS 2021

Short description

<<<<<<< HEAD

The last decade has been a critical one regarding cybersecurity, with studies estimating the cost of cybercrime to be up to 1 percent of the global GDP in 2020. The capability to detect, analyze, and defend against threats in (near) real-time conditions is not possible without employing machine learning techniques and big data infrastructures. This gives rise to cyberthreat intelligence and analytic solutions, such as (informed) machine learning on big data and open-source intelligence, to perceive, reason, learn, and act against cyber adversary techniques and actions. Moreover, organisations’ security analysts have to manage and protect systems and deal with the privacy and security of all personal and institutional data under their control. The aim of this workshop is to provide researchers with a forum to exchange and discuss scientific contributions, open challenges and recent achievements in machine learning and their role in the development of secure systems.

=======

The last decade has been a critical one regarding cybersecurity, with studies estimating the cost of cybercrime to be up to 1 percent of the global GDP in 2020. The capability to detect, analyze, and defend against threats in (near) real-time conditions is not possible without employing machine learning techniques and big data infrastructures. This gives rise to cyberthreat intelligence and analytic solutions, such as (informed) machine learning on big data and open-source intelligence, to perceive, reason, learn, and act against cyber adversary techniques and actions. Moreover, organisations’ security analysts have to manage and protect systems and deal with the privacy and security of all personal and institutional data under their control. The aim of this workshop is to provide researchers with a forum to exchange and discuss scientific contributions, open challenges and recent achievements in machine learning and their role in the development of secure systems.

>>>>>>> 8cd7dda (Initial Push)

Relevance to the Machine Learning Community

<<<<<<< HEAD

Cybersecurity is of the utmost importance for computing systems. The ethics guidelines for trustworthy artificial intelligence authored by the European Commission’s Independent High Level Expert Group on Artificial Intelligence on April 2019 have highlighted that machine learning-based artificial intelligence developments in various fields, including cybersecurity, are improving the quality of our lives every day, that AI systems should be resilient to attacks and security, and that they should consider security-by-design principles.

Due to the scale and complexity of current systems, cybersecurity is a permanent and growing concern in industry and academia. On the one hand, the volume and diversity of functional and non-functional data, including open source information, along with increasingly dynamical operating environments, create additional obstacles to the security of systems and to the privacy and security of data. On the other hand, it creates an information rich environment that, leveraged by techniques in the crossing of modern machine learning, data science and visualization fields, will contribute to improve systems and data security and privacy.

This poses significant, industry relevant, challenges to the machine learning and cybersecurity communities, as the main problems arise in contexts of dynamic operating environments and unexpected operating conditions, motivating the demand for production-ready systems able to improve and, adaptively, maintain the security of computing systems as well as the security and privacy of data.

Based on the recent history, we plan to organize this workshop as a European forum for cybersecurity researchers and practitioners that wish to discuss the recent developments of machine learning for developing cybersecurity, by paying special attention to solutions rooted in adversarial learning, pattern mining, neural networks and deep learning, probabilistic inference, anomaly detection, stream learning and mining, and big data analytics.

=======

Cybersecurity is of the utmost importance for computing systems. The ethics guidelines for trustworthy artificial intelligence authored by the European Commission’s Independent High Level Expert Group on Artificial Intelligence on April 2019 have highlighted that machine learning-based artificial intelligence developments in various fields, including cybersecurity, are improving the quality of our lives every day, that AI systems should be resilient to attacks and security, and that they should consider security-by-design principles.

Due to the scale and complexity of current systems, cybersecurity is a permanent and growing concern in industry and academia. On the one hand, the volume and diversity of functional and non-functional data, including open source information, along with increasingly dynamical operating environments, create additional obstacles to the security of systems and to the privacy and security of data. On the other hand, it creates an information rich environment that, leveraged by techniques in the crossing of modern machine learning, data science and visualization fields, will contribute to improve systems and data security and privacy.

This poses significant, industry relevant, challenges to the machine learning and cybersecurity communities, as the main problems arise in contexts of dynamic operating environments and unexpected operating conditions, motivating the demand for production-ready systems able to improve and, adaptively, maintain the security of computing systems as well as the security and privacy of data.

Based on the recent history, we plan to organize this workshop as a European forum for cybersecurity researchers and practitioners that wish to discuss the recent developments of machine learning for developing cybersecurity, by paying special attention to solutions rooted in adversarial learning, pattern mining, neural networks and deep learning, probabilistic inference, anomaly detection, stream learning and mining, and big data analytics.

>>>>>>> 8cd7dda (Initial Push)

Motivation

<<<<<<< HEAD

The last decade has been a critical one regarding cybersecurity, with studies estimating the cost of cybercrime to be up to 1 percent of the global GDP in 2020. Cyberthreats have increased dramatically, exposing sensitive personal and business information, disrupting critical operations and imposing high costs on the economy. The number, frequency, and sophistication of threats will only increase and will become more targeted in nature. Furthermore, today’s computing systems operate under increasing scales and dynamic environments, ingesting and generating more and more functional and non-functional data. The capability to detect, analyze, and defend against threats in (near) real-time conditions is not possible without employing machine learning techniques and big data infrastructure. This gives rise to cyber threat intelligence and analytic solutions, such as (informed) machine learning on big data and open-source intelligence, to perceive, reason, learn, and act against cyber adversary techniques and actions. Moreover, organisations’ security analysts have to manage and protect these systems and deal with the privacy and security of all personal and institutional data under their control. This calls for tools and solutions combining the latest advances in areas such as data science, visualization, and machine learning. We strongly believe that the significant advance of the state-of-the-art in machine learning over the last years has not been fully exploited to harness the potential of available data, for the benefit of systems-and-data security and privacy. In fact, while machine learning algorithms have been already proven beneficial for the cybersecurity industry, they have also highlighted a number of shortcomings. Traditional machine algorithms are often vulnerable to attacks, known as adversarial learning attacks, which can cause the algorithms to misbehave or reveal information about their inner workings. As machine learning-based capabilities become incorporated into cyber assets, the need to understand adversarial learning and address it becomes clear. On the other hand, when a significant amount of data is collected from or generated by different security monitoring solutions, big-data analytical techniques are necessary to mine, interpret and extract knowledge of these big data.

=======

The last decade has been a critical one regarding cybersecurity, with studies estimating the cost of cybercrime to be up to 1 percent of the global GDP in 2020. Cyberthreats have increased dramatically, exposing sensitive personal and business information, disrupting critical operations and imposing high costs on the economy. The number, frequency, and sophistication of threats will only increase and will become more targeted in nature. Furthermore, today’s computing systems operate under increasing scales and dynamic environments, ingesting and generating more and more functional and non-functional data. The capability to detect, analyze, and defend against threats in (near) real-time conditions is not possible without employing machine learning techniques and big data infrastructure. This gives rise to cyber threat intelligence and analytic solutions, such as (informed) machine learning on big data and open-source intelligence, to perceive, reason, learn, and act against cyber adversary techniques and actions. Moreover, organisations’ security analysts have to manage and protect these systems and deal with the privacy and security of all personal and institutional data under their control. This calls for tools and solutions combining the latest advances in areas such as data science, visualization, and machine learning. We strongly believe that the significant advance of the state-of-the-art in machine learning over the last years has not been fully exploited to harness the potential of available data, for the benefit of systems-and-data security and privacy. In fact, while machine learning algorithms have been already proven beneficial for the cybersecurity industry, they have also highlighted a number of shortcomings. Traditional machine algorithms are often vulnerable to attacks, known as adversarial learning attacks, which can cause the algorithms to misbehave or reveal information about their inner workings. As machine learning-based capabilities become incorporated into cyber assets, the need to understand adversarial learning and address it becomes clear. On the other hand, when a significant amount of data is collected from or generated by different security monitoring solutions, big-data analytical techniques are necessary to mine, interpret and extract knowledge of these big data.

>>>>>>> 8cd7dda (Initial Push)

Goals

<<<<<<< HEAD

The workshop follows the success of the two previous editions (MLCS 2019 and MLCS 2020) co-located with ECML-PKDD 2019 and ECML-PKDD 2020 - in both editions the workshop gained strong interest, with an attendance between 30 and 40 participants, lively discussions after the talks, and a vibrant panel discussion in the 2019 edition. It aims at providing researchers with a forum to exchange and discuss scientific contributions and open challenges, both theoretical and practical, related to the use of machine-learning approaches in cybersecurity. We want to foster joint work and knowledge exchange between the cybersecurity community, and researchers and practitioners from the machine learning area, and its crossing with big data, data science, and visualization. The workshop shall provide a forum for discussing novel trends and achievements in machine learning and their role in the development of secure systems. It aims to highlight the latest research trends in machine learning, privacy of data, big data, deep learning, incremental and stream learning, and adversarial learning. In particular, it aims to promote the application of these emerging techniques to cybersecurity and measure the success of these less-traditional algorithms.

The workshop shall contribute to identify new application areas as well as open and future research problems related to the application of machine-learning in the cybersecurity field.

=======

The workshop follows the success of the two previous editions (MLCS 2019 and MLCS 2020) co-located with ECML-PKDD 2019 and ECML-PKDD 2020 - in both editions the workshop gained strong interest, with an attendance between 30 and 40 participants, lively discussions after the talks, and a vibrant panel discussion in the 2019 edition. It aims at providing researchers with a forum to exchange and discuss scientific contributions and open challenges, both theoretical and practical, related to the use of machine-learning approaches in cybersecurity. We want to foster joint work and knowledge exchange between the cybersecurity community, and researchers and practitioners from the machine learning area, and its crossing with big data, data science, and visualization. The workshop shall provide a forum for discussing novel trends and achievements in machine learning and their role in the development of secure systems. It aims to highlight the latest research trends in machine learning, privacy of data, big data, deep learning, incremental and stream learning, and adversarial learning. In particular, it aims to promote the application of these emerging techniques to cybersecurity and measure the success of these less-traditional algorithms.

The workshop shall contribute to identify new application areas as well as open and future research problems related to the application of machine-learning in the cybersecurity field.

>>>>>>> 8cd7dda (Initial Push)

Call for papers

<<<<<<< HEAD

MLCS welcomes both research papers reporting results from mature work, recently published work, as well as more speculative papers describing new ideas or preliminary exploratory work. Papers reporting industry experiences and case studies will also be encouraged. However, it should be noticed that papers based on recently published work will not be considered for publication in the proceedings.

=======

MLCS welcomes both research papers reporting results from mature work, recently published work, as well as more speculative papers describing new ideas or preliminary exploratory work. Papers reporting industry experiences and case studies will also be encouraged. However, it should be noticed that papers based on recently published work will not be considered for publication in the proceedings.

>>>>>>> 8cd7dda (Initial Push)

Topics

<<<<<<< HEAD

All topics related to the contribution of machine learning approaches to the security of organisations’ systems and data are welcome. These include, but are not limited to:

=======

All topics related to the contribution of machine learning approaches to the security of organisations’ systems and data are welcome. These include, but are not limited to:

>>>>>>> 8cd7dda (Initial Push)

<<<<<<< HEAD

  • Machine learning for:
    • the security and dependability of networks, systems, and software
    • open-source threat intelligence and cybersecurity situational awareness
    • data security and privacy
    • cybersecurity forensic analysis
    • the development of smarter security control
    • the fight against (cyber)crime, e.g., biometrics, audio/image/video analytics
    • vulnerability analysis
    • the analysis of distributed ledgers
    • malware, anomaly, and intrusion detection

  • Adversarial machine learning and the robustness of AI models against malicious actions
  • Interpretability and Explainability of machine learning models in cybersecurity
  • Privacy preserving machine learning
  • Trusted machine learning
  • Data-centric security
  • Scalable / big data approaches for cybersecurity
  • Deep learning for automated recognition of novel threats
  • Graph representation learning in cybersecurity
  • Continuous and one-shot learning
  • Informed machine learning for cybersecurity
  • User and entity behavior modeling and analysis

=======
  • Machine learning for:
    • the security and dependability of networks, systems, and software
    • open-source threat intelligence and cybersecurity situational awareness
    • data security and privacy
    • cybersecurity forensic analysis
    • the development of smarter security control
    • the fight against (cyber)crime, e.g., biometrics, audio/image/video analytics
    • vulnerability analysis
    • the analysis of distributed ledgers
    • malware, anomaly, and intrusion detection

  • Adversarial machine learning and the robustness of AI models against malicious actions
  • Interpretability and Explainability of machine learning models in cybersecurity
  • Privacy preserving machine learning
  • Trusted machine learning
  • Data-centric security
  • Scalable / big data approaches for cybersecurity
  • Deep learning for automated recognition of novel threats
  • Graph representation learning in cybersecurity
  • Continuous and one-shot learning
  • Informed machine learning for cybersecurity
  • User and entity behavior modeling and analysis

>>>>>>> 8cd7dda (Initial Push)

Paper submission

<<<<<<< HEAD

MLCS welcomes both research papers reporting results from mature work, recently published work, as well as more speculative papers describing new ideas or preliminary exploratory work. Papers reporting industry experiences and case studies will also be encouraged. However, it should be noticed that papers based on recently published work will not be considered for publication in the proceedings.

Submissions are accepted in two formats:

  • Regular research papers with 12 to 16 pages including references. To be published in the proceedings, research papers must be original, not published previously, and not submitted concurrently elsewhere.
  • Short research statements of at most 6 pages. Research statements aim at fostering discussion and collaboration. They may review research published previously or outline new emerging ideas.

All submissions should be made in PDF using the EasyChair platform and must adhere to the Springer LNCS style. Templates are available here.

All regular workshop papers (except papers reporting recently published work) will be published in the workshop proceedings. Research statements will be published online in the workshop program page.

=======

MLCS welcomes both research papers reporting results from mature work, recently published work, as well as more speculative papers describing new ideas or preliminary exploratory work. Papers reporting industry experiences and case studies will also be encouraged. However, it should be noticed that papers based on recently published work will not be considered for publication in the proceedings.

Submissions are accepted in two formats:

  • Regular research papers with 12 to 16 pages including references. To be published in the proceedings, research papers must be original, not published previously, and not submitted concurrently elsewhere.
  • Short research statements of at most 6 pages. Research statements aim at fostering discussion and collaboration. They may review research published previously or outline new emerging ideas.

All submissions should be made in PDF using the EasyChair platform and must adhere to the Springer LNCS style. Templates are available here.

All regular workshop papers (except papers reporting recently published work) will be published in the workshop proceedings. Research statements will be published online in the workshop program page.

>>>>>>> 8cd7dda (Initial Push)

Important dates

Regular and research statement papers

  • <<<<<<< HEAD

    =======

    >>>>>>> 8cd7dda (Initial Push)

    June 23

    Extended: June 30

    Submission deadline

  • <<<<<<< HEAD ======= >>>>>>> 8cd7dda (Initial Push)

    July 21

    Extended: July 24

    Paper author notification

  • July 31

    <<<<<<< HEAD ======= >>>>>>> 8cd7dda (Initial Push)

    Camera ready submission deadline

Organizing Committee

Donato Malerba

<<<<<<< HEAD

Università degli Studi di Bari
Dipartimento di Informatica
Italy

=======

Università degli Studi di Bari
Dipartimento di Informatica
Italy

>>>>>>> 8cd7dda (Initial Push)

Giuseppina Andresini

<<<<<<< HEAD

Università degli Studi di Bari
Dipartimento di Informatica
Italy

=======

Università degli Studi di Bari
Dipartimento di Informatica
Italy

>>>>>>> 8cd7dda (Initial Push)

Ibéria Medeiros

Universidade de Lisboa
<<<<<<< HEAD Faculdade de Ciências
LASIGE
Potugal

======= Faculdade de Ciências
LASIGE
Potugal

>>>>>>> 8cd7dda (Initial Push)

Michael Kamp

Monash University <<<<<<< HEAD
Australia

=======
Australia

>>>>>>> 8cd7dda (Initial Push)

Pedro M. Ferreira

Universidade de Lisboa
<<<<<<< HEAD Faculdade de Ciências
LASIGE
Portugal

======= Faculdade de Ciências
LASIGE
Portugal

>>>>>>> 8cd7dda (Initial Push)

Program Committee

<<<<<<< HEAD ======= >>>>>>> 8cd7dda (Initial Push)

Confirmed members

<<<<<<< HEAD

    <<<<<<< HEAD
  • Aikaterini Mitrokotsa, Chalmers University of Technology, Sweden
  • Gennady Andrienko, Fraunhofer IAIS, Germany
  • Gianluigi Folino, National Research Council of Italy, Italy
  • Leonardo Aniello, University of Southampton, United Kingdom
  • Marc Dacier, Eurecom, France
  • Marco Vieira, University of Coimbra, Portugal
  • Miguel Correia, University of Lisbon, Portugal
  • Mihalis Nicolaou, Cyprus Institute, Cyprus
  • Rogério de Lemos, University of Kent, United Kingdom
  • Tommaso Zoppi, University of Florence, Italy
  • Vasileios Mavroeidis, University of Oslo, Norway

=======
  • Aikaterini Mitrokotsa, Chalmers University of Technology, Sweden
  • Gennady Andrienko, Fraunhofer IAIS, Germany
  • Gianluigi Folino, National Research Council of Italy, Italy
  • Leonardo Aniello, University of Southampton, United Kingdom
  • Marc Dacier, Eurecom, France
  • Marco Vieira, University of Coimbra, Portugal
  • Miguel Correia, University of Lisbon, Portugal
  • Mihalis Nicolaou, Cyprus Institute, Cyprus
  • Rogério de Lemos, University of Kent, United Kingdom
  • Tommaso Zoppi, University of Florence, Italy
  • Vasileios Mavroeidis, University of Oslo, Norway
  • >>>>>>> 8cd7dda (Initial Push)

    Program

    <<<<<<< HEAD

    Keynote speaker

    =======

    Keynote speaker

    >>>>>>> 8cd7dda (Initial Push)

    Lorenzo Cavallaro

    <<<<<<< HEAD

    University College London
    United Kingdom

    =======

    University College London
    United Kingdom

    >>>>>>> 8cd7dda (Initial Push)

    MLCS 2021 programme

    <<<<<<< HEAD

    13/09/2021 08:50 - 16:30

    =======

    13/09/2021 08:50 - 16:30

    >>>>>>> 8cd7dda (Initial Push) ======= Donato Malerba, Università degli Studi di Bari >>>>>>> 8cd7dda (Initial Push) <<<<<<< HEAD ======= >>>>>>> 8cd7dda (Initial Push) ======= Moderator: Michael Kamp >>>>>>> 8cd7dda (Initial Push)
    08:50-09:00 Opening remarks: Welcome to MLCS 2021!
    <<<<<<< HEAD Donato Malerba, Università degli Studi di Bari
    Session 1: Keynote talk
    Session chair: Giuseppina Andresini, Università degli Studi di Bari
    09:00-10:00 Trustworthy Machine Learning for Systems Security
    Lorenzo Cavallaro, University College London
    Session 1: Keynote talk
    Session chair: Giuseppina Andresini, Università degli Studi di Bari
    09:00-10:00 Trustworthy Machine Learning for Systems Security
    Lorenzo Cavallaro, University College London
    10:00-10:30 Coffee break
    Session 2: Paper Presentation with Q&A
    Session chair: Pedro Ferreira, Faculty of Sciences - University of Lisbon
    10:30-11:00 Dealing with Imbalanced Data in Multi-Class Network Intrusion Detection Systems using XGBoost
    Malik Al-Essa and Annalisa Appice
    11:00-11:30 NBcoded: network attack classifiers based on Encoder and Naive Bayes model for resource limited devices
    Lander Segurola, Francesco Zola, Xabier Echeberria-Barrio and Raul Orduna
    11:30-12:00 Adversarial Robustness of Probabilistic Network Embedding for Link Prediction
    Xi Chen, Bo Kang, Jefrey Lijffijt and Tijl De Bie
    12:00-12:30 Practical Black Box Model Inversion Attacks against Neural Nets
    Thomas Bekman, Masoumeh Abolfathi, Haadi Jafarian, Ashis Biswas, Farnoush Banaei-Kashani and Kuntal Das
    Session 2: Paper Presentation with Q&A
    Session chair: Pedro Ferreira, Faculty of Sciences - University of Lisbon
    10:30-11:00 Dealing with Imbalanced Data in Multi-Class Network Intrusion Detection Systems using XGBoost
    Malik Al-Essa and Annalisa Appice
    11:00-11:30 NBcoded: network attack classifiers based on Encoder and Naive Bayes model for resource limited devices
    Lander Segurola, Francesco Zola, Xabier Echeberria-Barrio and Raul Orduna
    11:30-12:00 Adversarial Robustness of Probabilistic Network Embedding for Link Prediction
    Xi Chen, Bo Kang, Jefrey Lijffijt and Tijl De Bie
    12:00-12:30 Practical Black Box Model Inversion Attacks against Neural Nets
    Thomas Bekman, Masoumeh Abolfathi, Haadi Jafarian, Ashis Biswas, Farnoush Banaei-Kashani and Kuntal Das
    12:30-14:30 Lunch break
    Session 3: Panel Discussion
    <<<<<<< HEAD Moderator: Michael Kamp
    14:30 - 16:30 Robustness of ML-based cybersecurity against adversarial attacks
    Panellists to be defined
    14:30 - 16:30 Robustness of ML-based cybersecurity against adversarial attacks
    Panellists to be defined
    <<<<<<< HEAD
    =======
    >>>>>>> 8cd7dda (Initial Push)

    Venue

    The conference will be fully organized online. There is no physical venue to go.

    <<<<<<< HEAD
    =======
    >>>>>>> 8cd7dda (Initial Push)

    Contact Us

    for any question regarding the workshop

    <<<<<<< HEAD

    =======

    >>>>>>> 8cd7dda (Initial Push)

    <<<<<<< HEAD ======= >>>>>>> 8cd7dda (Initial Push)

    <<<<<<< HEAD ======= >>>>>>> 8cd7dda (Initial Push)
    <<<<<<< HEAD ======= >>>>>>> 8cd7dda (Initial Push)