Главная
Study mode:
on
1
Introduction
2
Denial of Service attacks
3
Internet of Things
4
What can we do
5
Firewall
6
Intrusion Detection System
7
Anomaly Based Detection
8
What is PEIMA
9
Power Laws
10
Pareto Distribution
11
Zips Law
12
Why is this interesting
13
DoS attacks
14
March of the Red crabs
15
Anomaly detection
16
Detecting altered processes
17
How to use PEIMA
18
Example
19
Conclusion
20
Questions
Description:
Explore a groundbreaking approach to detecting malicious network activities in this 25-minute Black Hat conference talk. Delve into the PEIMA (Power-law Exponent Inspection for Malicious Activity) method, which harnesses power laws to identify and mitigate various cyber threats, including Distributed Denial of Service (DDoS) attacks, intrusion attempts, and abnormal traffic patterns. Learn how this innovative technique can be applied to combat the rising challenges posed by IoT devices and sophisticated attack vectors. Gain insights into the practical implementation of PEIMA, understanding its foundations in power laws, Pareto distribution, and Zipf's law. Discover real-world applications, from detecting DoS attacks to identifying altered processes, and equip yourself with a powerful tool to enhance network security and anomaly detection capabilities.

PEIMA - Harnessing Power Laws to Detect Malicious Activities

Black Hat
Add to list
0:00 / 0:00