Главная
Study mode:
on
1
Intro
2
Types of attack
3
What drives attack sophistication
4
Evolution of attack and detection methods
5
Behavioral detection: User Behavior Analysis
6
Behavioral detection: Behavioral biometric detection
7
Behavioral Detection Use Cases
8
User Behavioral Analysis Examines the context of the interactions
9
Behavioral biometrics available depends on the client
10
Behavioral biometrics - Mouse Motion Timing
11
Behavioral biometrics - Mouse Velocity
12
Behavioral biometrics - Mouse Acceleration
13
Behavioral biometrics - Touch interactions Machine
14
Behavioral biometrics - Key Press Metrics
15
Behavioral biometrics - Spoofing • Many different ways to falsify inputs
16
Why use behavioral detection? Pros
Description:
Explore the evolving landscape of web API protection in this OWASP Foundation conference talk. Delve into advanced attack methods and defense strategies, focusing on behavioral detection techniques. Learn about the challenges posed by sophisticated attackers who bypass traditional device and IP intelligence methods. Discover how user behavior analysis and behavioral biometrics can be leveraged to detect suspicious activity. Examine various behavioral signals, including mouse movements, key presses, and touch events, and understand how machine learning algorithms can be applied to process this information effectively. Gain insights into the pros and cons of behavioral detection and its practical applications in cybersecurity.

Who's in Control: Human or Machine? - Behavioral Detection in Cybersecurity

OWASP Foundation
Add to list