Cyber Security Intelligence (CSI) team       


Cyber Security Intelligence (CSI) team - overview

The Cyber Security Intelligence (CSI) team (formerly GSAL and CCSI) investigates methodologies and technologies to help organizations detect, understand, and deflect advanced cybersecurity threats and attacks on their infrastructure and in the cloud. It explores challenging research problems posed by building and combining AI and cognitive methods (e.g., contextual and behavioral analysis, machine learning, reasoning), scalable big data security analytics (e.g., graph mining, deep correlation and provenance analysis), and next-generation defense mechanisms (e.g., transparent malware analysis, active defense and cyber deception layers) to gain deep intelligence and insights about cybersecurity threats and attacks as well as threat actors; and protecting AI models against model theft, poisoning and evasion attacks by adaptive adversaries.


Current focus areas and projects

  • AI-powered security offense analytics, cyber threat hunting, and threat intelligence consolidation
  • Cyber security analytics, event correlation, and provenance tracking on the host- and network-level
  • Next-generation malware analysis, and program behavior analytics
  • Security and robustness of AI models and adversarial machine learning
  • Cross-stack cyber deception and active defense techniques
  • Scalable data collection platforms for real-time and historical security analytics
  • Ethical hacking and penetration testing
  • Security data visualization


Recent highlights


Recent impact on IBM products and offerings

The CSI team had direct impact with core contributions to several new security products and solutions IBM launched in the last few years:


Jiyong Jang

Team Members

Jiyong Jang photo FREDERICO ARAUJO photo Sanjeev Das photo  Kevin Eykholt photo  photo Taesung Lee photo  Douglas L Schales photo Xiaokui Shu photo Teryl Taylor photo

DeepLocker: How AI Can Power a Stealthy New Breed of Malware

Security Knowledge Graph

Identify and Understand threats with Watson for Cyber Security

Exploring the Security Knowledge Graph