Defining current network threats
Network threats go well beyond the application level, and it’s unlikely that a single individual would provide support for every protective means that a network will require. For example, developers aren’t going to handle physical security – a security company will likely handle it. However, your ML application may interact with the physical security system by monitoring cameras and other sensors. If you think this is a little futuristic, companies such as Bosch (https://www.boschsecurity.com/xc/en/solutions/video-systems/video-analytics/) and Nelly’s Security (https://www.nellyssecurity.com/blog/articles/what-is-deep-learning-ai-and-why-is-it-important-for-video-surveillance) have products available today. An ML application can look for trends, such as an attacker who is casing a business before attempting to break in. The human monitoring the cameras may not see that the same person shows up on various nights, yet never...