Главная
Study mode:
on
1
Introduction
2
Overview
3
Context
4
Goals
5
Pipeline
6
Anomaly sessions
7
Logs
8
Data
9
Decrease Data
10
Results
11
Precision
12
Graphs
13
Graph Search
14
Virtual Nodes
15
What do we get
16
What to do
17
Trust the model
18
Graph Neural Network Explainer
19
Graph Neural Network Investigation
20
Challenges
21
Contact us
Description:
Explore graph-powered cybersecurity intelligence in this 23-minute conference talk from CloudWorld 2022. Dive into Oracle's threat detection pipeline, designed to build a real-time, smarter, and deeper cybersecurity intelligence system with interpretable results. Learn about the battle between cloud security providers and sophisticated malicious attackers, and discover how graph technology is revolutionizing threat detection. Gain insights into anomaly sessions, log data processing, and the use of graph search and virtual nodes. Understand the challenges of trusting machine learning models and the importance of interactive interpretation capabilities for threat investigators. Discover how Oracle's approach enables visual and interactive explanations from machine learning models, empowering security professionals to determine appropriate actions in response to evolving threats.

Graph-Charged Cybersecurity Intelligence

Oracle
Add to list
00:00
-00:44