Cybersecurity Intelligence (CSI) Team       

links

Cybersecurity Intelligence (CSI) Team - overview


The Cybersecurity Intelligence (CSI) team (formerly GSAL and CCSI) investigates methodologies and technologies to help organizations detect, understand, and deflect advanced cybersecurity threats and attacks on their infrastructure and in the cloud. It explores challenging research problems posed by building and combining AI and cognitive methods (e.g., contextual and behavioral analysis, machine learning, reasoning), scalable big data security analytics (e.g., graph mining, deep correlation and provenance analysis), and next-generation defense mechanisms (e.g., transparent malware analysis, active defense and cyber deception layers) to gain deep intelligence and insights about cybersecurity threats and attacks as well as threat actors; and protecting AI models against model theft, poisoning and evasion attacks by adaptive adversaries.

 

Current focus areas and projects

  • AI-powered security offense analytics, cyber threat hunting, and threat intelligence consolidation
  • Cyber security analytics, event correlation, and provenance tracking on the host- and network-level
  • Next-generation malware analysis, and program behavior analytics
  • Security and robustness of AI models and adversarial machine learning
  • Cross-stack cyber deception and active defense techniques
  • Scalable data collection platforms for real-time and historical security analytics
  • Ethical hacking and penetration testing
  • Security data visualization

 

Recent highlights

 

Recent impact on IBM products and offerings

The CSI team had direct impact with core contributions to several new security products and solutions IBM launched in the last few years:




Contact

Jiyong Jang


Team Members

Jiyong Jang photo FREDERICO ARAUJO photo Sanjeev Das photo  Kevin Eykholt photo  photo Taesung Lee photo  Douglas L Schales photo Xiaokui Shu photo Teryl Taylor photo


DeepLocker: How AI Can Power a Stealthy New Breed of Malware


Security Knowledge Graph


Identify and Understand threats with Watson for Cyber Security


Exploring the Security Knowledge Graph