Главная
Study mode:
on
1
Intro
2
Who are we
3
What is threat intelligence
4
The math talk
5
IP addresses
6
Metrics
7
Raw data
8
Inbound vs Outbound
9
Experiments with IP Addresses
10
Experiments with DNS
11
Dont do maps
12
Three tests
13
Information asymmetry
14
Novelty tests
15
Daily or hourly
16
Overlap test
17
Outbound test
18
Population test
19
True population
20
Public outbound
21
Hypothesis testing
22
Confidence intervals
23
Comparing different populations
24
Google
25
GPL
26
Combine
27
Main Takeaway
28
QA
29
Commercial feeds
30
False positives
Description:
Explore the intricacies of evaluating threat intelligence feeds in this 56-minute conference talk from BSidesLV 2014. Delve into the mathematics behind IP addresses, metrics, and raw data analysis. Learn about inbound vs outbound experiments with IP addresses and DNS, and discover why mapping may not be the most effective approach. Examine three crucial tests: information asymmetry, novelty, and overlap. Investigate population testing, hypothesis testing, and confidence intervals for comparing different data sets. Gain insights on commercial feeds, false positives, and key takeaways to enhance your cybersecurity strategy. Engage with the speakers during the Q&A session to further your understanding of threat intelligence feed evaluation.

Measuring the IQ of Your Threat Intelligence Feeds

BSidesLV
Add to list
0:00 / 0:00