Главная
Study mode:
on
1
Introduction
2
Definitions
3
NetFlow
4
Silk
5
Magic Quadrant
6
Signature Based Detection
7
Metadata
8
Boolean Detection
9
Behavioral Analysis
10
Anomaly Detection
11
Algorithmic Detection
12
Histograms
13
Service Type
14
Ukraine
15
Data disclosure
16
The Customer
17
Organized Criminals
18
Trade Secret Deal
19
Data Leaving Network
20
State Sponsored Attack
21
Address Scanning
22
Traffic Graph
23
Incidents
Description:
Explore advanced cybersecurity breaches from 2013 and learn about behavioral detection techniques in this 49-minute conference talk. Delve into topics such as NetFlow, Silk, signature-based detection, metadata analysis, and behavioral analytics. Examine real-world case studies involving data disclosure, organized criminals, and state-sponsored attacks. Gain insights into traffic analysis, incident response, and advanced threat detection methods to enhance your organization's security posture.

Advanced Breaches of 2013 vs Behavioral Detection - GrrCON 2014

Add to list
0:00 / 0:00