Главная
Study mode:
on
1
Intro
2
Virus Scanning
3
Honeypots
4
Phishing
5
Passive DNS
6
System Overview
7
System Facts
8
Why this model
9
Storage
10
Data Model
11
Why graph
12
Scaling up
13
Stats
14
IP Age Distribution
15
Malicious IP Addresses by Country
16
Question
17
Sandbox
18
Malicious
Description:
Explore a comprehensive talk from DefCamp 2016 on transforming threat intelligence into actionable rapsheets. Delve into topics such as virus scanning, honeypots, phishing, and passive DNS. Learn about system overview, facts, and the rationale behind the chosen model. Discover insights on data storage, modeling, and the benefits of graph-based approaches. Examine scaling strategies, statistics, IP age distribution, and malicious IP addresses by country. Gain knowledge about sandbox environments and their role in threat analysis. This presentation from Central and Eastern Europe's premier Hacking & Information Security conference offers valuable insights for security specialists, decision-makers, and developers in the INFOSEC field.

From Threat Intelligence to Rapsheets in Just a Few Steps - DefCamp - 2016

DefCamp
Add to list