Thursday, August 18, 2016

Grokking Deep Learning

https://iamtrask.github.io/2016/08/17/grokking-deep-learning/


If you passed high school math and can hack around in Python, I want to teach you Deep Learning.
Well folks, I've decided to write a Deep Learning book in the same style as my blog, teaching Deep Learning from an intuitive perspective, all in Python, using only numpy. I wanted to make the lowest possible barrier to entry to learn Deep Learning.
Here's what you need to know:
• High School Math (basic algebra)
• Python... the basics
The Problem with most entry level Deep Learning resources these days is that they either assume advanced knowledge of Calculus, Linear Algebra, Differential Equations, and perhaps even Convex Optimization, or they just teach a "black box" framework like Torch, Keras, or TensorFlow (where you just hit "train" but you don't actually know what's going on under the hood). Both have their appropriate audience, but I don't believe that either are appropriate for your average python hacker looking for a 101 on the fundamentals.
My Solution is to teach Deep Learning from an intuitive standpoint, just like I've done in the other posts on this blog. Everything you need to know to understand Deep Learning will be explained like you would to a 5 year old, including the bits and pieces of Linear Algebra and Calculus that are necessary. You'll learn how neural networks work, and how to use them to classify images, understand language (including machine translation), and even play games.
At the time of writing, I think that this is the only Deep Learning resource that is taught this way. I hope you enjoy it.
Who This Book Is NOT For: people who would rather be taught using formulas. Individuals with advanced mathematical backgrounds should choose another resource. This book is for an introduction to Deep Learning. It's about lowering the barrier to entry.
Click To See the Early Release Page (where the first three chapters are)

Saturday, August 6, 2016

Thursday, August 4, 2016

Wallarm Uses Incoming Hacker Attacks to Reveal Security Flaws in Web Apps and APIs

Machine learning meet network security

http://themacro.com/articles/2016/08/wallarm/
 
Cyber attacks have become dismayingly common as companies run faster by deploying code every day without security audits. More than 117 million emails and passwords were leaked during the LinkedIn hack and the Ashley Madison hack exposed 37 million accounts. The list continues to grow despite the numerous security solutions on the market.
Wallarm introduces a unique approach to protect web applications and APIs against data breaches. It uses machine learning to analyze the normal user behavior of the web application, block abnormal user requests, and see if these requests expose vulnerabilities. It is already used by more than 70 enterprises such as payment systems, search engines, e-commerce in Europe.
By creating a profile of what legitimate behavior looks like, Wallarm can easily distinguish between regular user activity and malicious attacks from hackers. These security rules are determined by how user behaves and changes with each new deployment for each web application.
When Wallarm detects behavior that falls outside of a normal user profile, it will automatically block the user. Typical security products only alert security teams of these malicious behaviors but are unable to determine which ones to prioritize. Wallarm is able to pinpoint these attacks by blocking the user and then testing it against the web application to see if a critical vulnerability exists. If it does, Wallarm alerts the security team immediately, helping them prioritize which security issues to focus on. This makes all the difference for large companies facing thousands of attacks a day.

“What we’ve done is taken malicious hacker activity and turned it into a method for finding security bugs for companies,” says Ivan Novikov, co-founder of Wallarm. “When attackers discover a new vulnerability in a web application, customer is the first one to know about it. This helps companies move faster without having to worry about staying secure as they deploy their code.”
With the proliferation of cyber attacks, businesses are spending more to ensure they have the best security software. As a result, the global cybersecurity market is expected to reach $120 billion by 2020. Companies like Facebook are now paying up to $15,000 for each critical security flaw reported through their bug bounty program. Wallarm allows to companies to reveal critical vulnerabilities in an automated and safer way.
“In addition to having a great team, Wallarm is especially impressive because it is integrated right into NGINX, making it incredibly simple to deploy,” says Dalton Caldwell, Partner at Y Combinator. “Their current customers like Yandex, with huge amounts of traffic, is testament to how compelling and battle-tested this product is.”
Ivan Novikov, Alexander Golovko, Stepan Ilyin, Anastasia Novikova are the co-founders behind Wallarm. The four were a group of whitehat hackers that helped big companies with penetration tests. After they finished each penetration test, customers would ask for a good product to ensure continuous security for web applications. When they realized there was none, these four whitehat hackers decided to build Wallarm.

Playing for Data: Ground Truth from Computer Games

http://download.visinf.tu-darmstadt.de/data/from_games/