Главная
Study mode:
on
1
Intro
2
whoami
3
Security Singularity Approaches
4
Guess the Year!
5
A little history
6
Three Letter Acronyms - KDD
7
Trolling, maybe?
8
Not here to bash academia
9
A Probable Outcome
10
ML Marketing Patterns
11
Anomaly Detection
12
AD: Curse of Dimensionality
13
A practical example
14
A MORE practical example
15
Breaking the Curse
16
AD: Normality-poisoning attacks
17
AD: Hanlon's Razor
18
What about User Behavior?
19
Classification!
20
Lots of Malware Activity
21
Everyone makes mistakes!
22
What about the Ground Truth?
23
But what about data tampering?
24
And what about false positives?
25
Buyer's Guide
26
MLSec Project
Description:
Dive deep into the world of machine learning-based monitoring for information security in this comprehensive Black Hat conference talk. Explore the strengths and limitations of various data analysis and machine learning techniques applied to cybersecurity. Examine unfulfilled promises of deterministic and exploratory analysis, and learn how to avoid repeating past mistakes. Discover the presenter's latest research findings, including interesting results obtained since Black Hat USA 2013, and gain insights into potential improvements for applying machine learning in incident detection and response. Understand the challenges of anomaly detection, classification, and user behavior analysis in cybersecurity contexts. Evaluate the effectiveness of machine learning solutions against data tampering and false positives. Get practical advice for selecting and implementing machine learning-based security tools through a buyer's guide and exploration of the MLSec Project.

Secure Because Math - A Deep-Dive on Machine Learning-Based Monitoring

Black Hat
Add to list