Главная
Study mode:
on
1
Intro
2
The problem
3
Agenda
4
Complex Threats
5
Stages of an APT
6
Technical controls
7
Challenges in mitigation
8
How long does it take to remediate
9
James Bond
10
Solutions
11
Definitions
12
What does Machine Learning do
13
Available Data
14
Sneak Peak
15
Elastic Stack
16
Architecture
17
Algorithms
18
Text Mining
19
Building the Pipeline
20
Haystack
21
Are we building another CMS
22
Statistics
Description:
Explore the application of machine learning in detecting complex threats at DefCamp 2018 through this 40-minute conference talk. Delve into the challenges of mitigating advanced persistent threats (APTs), understand the stages of an APT, and learn about technical controls. Discover how machine learning can be leveraged in cybersecurity, examining available data, architecture, and algorithms. Gain insights into text mining techniques and the process of building an effective pipeline for threat detection. Analyze the concept of finding needles in haystacks and evaluate whether this approach leads to creating another content management system. Examine relevant statistics and leave with a deeper understanding of how machine learning is revolutionizing complex threat detection in the field of information security.

Needles, Haystacks and Algorithms - Using Machine Learning to Detect Complex Threats at DefCamp - 2018

DefCamp
Add to list
0:00 / 0:00