Главная
Study mode:
on
1
Intro
2
Who am I
3
Why this talk
4
Introduction
5
The Security Industry
6
How well are they working
7
Verizon Data Breach Report
8
Intrusion DetectionEfficacy
9
How do they get discovered
10
How do we compare
11
Other reports
12
Internal process
13
Climate change
14
What can we do
15
What is intrusion detection
16
Systems are not binary affairs
17
The false positive fallacy
18
The reality is more subtle
19
All events are welcome
20
Examples
21
IntelligenceDriven Detection
22
Registry Modifications
23
Blank User Agents
24
Event Pipeline
25
Blacklisting
26
Identity Translation
27
Correlation
28
Attack Plane
29
HostBased Correlation
30
Vanilla Correlation
31
Kill Chain
32
Attack Stages
33
Attack Planes
34
Context or Out of Context
35
Situational Awareness
36
Final Thoughts
37
Contact Info
Description:
Explore the failures of intrusion detection systems and learn innovative approaches to improve cybersecurity in this Black Hat USA 2012 conference talk. Delve into the fundamental problems plaguing the field and discover why current solutions fall short in detecting sophisticated attacks. Gain insights into the concepts of the attacker plane and kill chain, and learn how to leverage them to create more effective intrusion detection systems. Examine the security industry's shortcomings, analyze data breach reports, and understand the complexities of intrusion detection beyond binary classifications. Discover intelligence-driven detection techniques, event pipeline processes, and correlation methods. Investigate attack stages, situational awareness, and context-based approaches to enhance your organization's defense capabilities. Whether you're a seasoned professional or new to cybersecurity, this talk offers valuable perspectives on improving intrusion detection strategies.

Intrusion Detection Along the Kill Chain - Why Your Detection System Sucks

Black Hat
Add to list
0:00 / 0:00