SlideShare a Scribd company logo
1 of 38
Download to read offline
Beyond	Matching:	Applying	data	science	
techniques	to	IOC-based	detection
(#BeyondMatching)
Alex	Pinto	- Chief	Data	Scientist	– Niddel
@alexcpsec
@NiddelCorp
• Security	Data	Scientist
• Capybara	Enthusiast
• Co-Founder	and	Chief	Data	Scientist	at	Niddel	
(@NiddelCorp)
• Lead	of	MLSec Project	(@MLSecProject)	
Who	am	I?
• What	is	a	Niddel?
• Niddel	provides	a	SaaS-based	Autonomous	Threat	Hunting	System
• Research	from	this	talk	was	performed	using	anonymized	Niddel	data	and	
uses	concepts	implemented	on	its	products.
• Not	a	vendor-centric	talk,	focus	on	learning	and	y’all to	reproduce	this.
• The	Promise	of	IOCs
• 7 Habits	of	Highly	Effective	Analysts	(ok,	
only	3)
• Nation-State	APT	Detection	Deluxe	Recipe
• Data	Science	to	Assist	on	Pivoting
• Maliciousness	Ratio
• Maliciousness	Rating
• Revisiting	TIQ-TEST	– Telemetry	Test
Agenda
The	Promise	of	IOCs
If	you	haven’t	implemented	Threat	
Intelligence	feeds	on	your	
organization
I	will	reveal	the	ending	of	your	
upcoming	grueling	journey
Apologies	in	advance
Promise	- Some	Definitions	First
• IOCs:	Indicators	of	compromise
• CTI:	Cyber	Threat	Intelligence
• Will	be	using	them	interchangeably	
during	this	presentation
• IOCs	->	technical	data	that	allows	for	
”tactical”	discovery	of	a	potential	
compromise	on	a	system
• We	will	be	focusing	on	network	IOCs	on	
this	talk
Little	Bobby	Comics	by	@RobertMLee and	Jeff	Haas
Promise	– Sounds	Great!	Sign	me	up!
• Not	so	fast,	my	friend
• Main	challenges	with	IOCs	consumption:
• Quality	and	Curation
• Vetting	and	quality	control
• Open	feeds	vs	Paid	feeds
• Manual	vs	Automated	
• Velocity	and	Volume
• How	to	operationalize?	
• Add	to	SIEM?
• Block	in	Firewall	/	Web	Proxy?
Promise	– Quality	and	Velocity	at	Odds
• AIS	– Threat	Intel	sharing	initiative	from	
US	Department	of	Homeland	Security
• I	fully	support	sharing	(see	previous	
intel	sharing	decks	from	2015)
• But	if	we	are	resigned	to	this	level	of	
quality,	”it	is	what	it	is”,	how	can	CTI	/	
IOCs	be	shaped	into	a	useful	tool	at	
scale?
Promise	– Current	Implementation	Strategies
1. Alerting	based	on	matching	with	IOC	data:
• By	being	careful,	only	matching	on	more	”precise”	indicators	(URLs	>>	IPs),	
you	can	reduce	number	of	False	Positives,	but	still	challenging
2. Using	IOC	data	to	build	context	for	existing	alerts:
• Safer	bet,	but	you	are	not	adding	any	detection	power	to	existing	controls
SPOILER ALERT:
Everyone starts with (1) because ”the FPs can’t be that bad”, and then begrudgingly
moves to (2) because there is not enough time in the world to go through all the
noise that (1) generates.
Sad	Intermission
DISCLAIMER:
Could not find a picture of a sad capybara. Not sure there is one.
What	makes	analysts	effective?
• They	learn	from	the	examples!!
• They	don’t	look	at	IOCs	as	a	”finished	
product”,	but	as	a	way	to	learn	from	the	
attacker	infrastructure.
• After	understanding	and	research	on	
samples	of	data,	they	can	extrapolate	
the	TTPs	(Tactics,	Techniques	and	
Procedures)	of	the	attackers	to	build	
defenses.
Pyramid	of	Pain	from	@DavidJBianco
Internet	Infrastructure	101
Actually, ”everything” is connected
Nation-State	APT	Detection	Deluxe	Recipe
When	your	”favorite	IR	company”	blames	FROSTY	PENGUIN	for	an	attack:
1. Find	a	piece	of	malware	on	compromised	organization
2. Extract	”non-benign”	places	they	connect	to	(real	work	here,	BTW)
3. Pivot	on	Internet	Infrastructure	to	find	related	IPs	/	Domains	/	URLs
4. Search	for	these	on	org,	find	more	malware	(Hunting,	FTW!)
5. Repeat	Steps	1-4	until	no	more	new	malware
6. Remediate	organization	(hopefully!)
7. Publish	report	or	blog	post	to	great	fanfare
8. PROFIT	(or	at	least	media	attention	and	sales	leads)
Data	Science	to	Assist	on	Pivoting
• Doing	it	ourselves:	- Begin	with	data	collection
1. Get	IOCs	from	your	favorite	/	available	providers	– there	are	a	few	options	
that	are	fairly	good.	Please	do	select	according	to	collection	criteria.
2. ”Enrich”	the	data	to	gather	the	”pivot	points”	and	find	the	connections.
Combine (https://github.com/mlsecproject/combine) can help with IOC gathering
and enrichment for ASN data and pDNS (if you have a Farsight pDNS key)
• IP	Addresses:
• AS	number
• BGP	prefix
• Country
• pDNS relationship	to	domains
• Domain	names:
• pDNS relationship	to	IPs
• WHOIS	Registrations
• SOA
• NS	Servers
Data	Collection	– Example	With	RIG	EK
WHOIS	registrant	e-mail	on	a	small	sample	of	RIG	EK	domains	on	Oct	2016:
Data	Collection	– Example	With	RIG	EK
This	one	is	NOT	Domain	Shadowing	– active	actor	registering	e-mails:
Data	Collection	– Example	With	RIG	EK
Autonomous	System	/	Country	of	IPs	are	located,	RIG	EK	sample	– Oct	2016:
Data	Collection	– Example	With	RIG	EK
Autonomous	System	where	IPs	are	located,	RIG	EK	sample	– Oct	2016:
Data	Aggregation	– Rig	EK	Example
In summary: let’s create different graphs for each one of the pivoting points and measure the
cardinality of the node connectedness
AS48096	- ITGRAD
AS16276	– OVH	SAS	L
AS14576	– Hosting	Solution	Ltd
(actually	king-servers.com)
Data	Aggregation	– Context	Matters
• What	if	my	favorite	websites	are	actually	hosted	at	those	pivoting	points?
• I	mean,	there	are	a	few	”ok”	things	on	.com	and	.org
Maliciousness	Ratio
Let’s	build	similar	aggregation	metrics	for	”good	places”	your	organizations	
We	propose	a	ratio	that	compares	the	cardinality	of	the	node	connectedness:
• Bpp – count	of	”bad	entities”	connected	to	a	specific	pivoting	point
• Gpp – count	of	”good	entities”	connected	to	a	specific	pivoting	point
𝑀𝑅## =	
&''
('')&''
Hold	on!!	Good	Places	on	the	Internet?
• Creating	and	maintaining	whitelists	is	MUCH	HARDER	than	blacklists
• Some	tips:
• Use	your	own	telemetry	- given	the	base	rate	fallacy,	places	that	”everyone”	
goes	to	are	more	likely	to	be	benign
• Rarity	does	not	mean	bad	(shut	up,	UEBA	people),	but	high	visitation	almost	
always	mean	good
• Harvest	data	from	your	own	security	tools,	like	web	filters	(if	you	trust	them)
• Very	shallow	scoops	of	Alexa	Top	Sites.	Very.	Shallow.
Maliciousness	Ratio	– Examples
• Telemetry	from	an	pool	of	Niddel	customers:
• AS48096	– ITGRAD	 87.5%
• Country	RU 5.2%
• .org	TLD 2.9%
• Looking	at	the	base	rate:
• ASN	Base	Rate 0.6%
• Country	Base	Rate 0.58%
• TLD	Base	Rate 1.9%
• Severe	outliers	below	base	rate	may	indicate	
that	the	IOC	is	invalid
Maliciousness	Rating
• A	ratio	from	0	to	1	can	be	cool	for	math	people,	but	how	risky	are	those	
things	anyway?
• We	need	to	compare	it	to	the	base	rate	to	have	a	good	measure
• We	propose	a	maliciousness	rating	which	express	how	much	more	likely	to	
be	bad	the	connection	with	a	specific	pivoting	point	than	an	average	pivoting	
point	of	that	kind	on	the	Internet.
𝑀𝑅𝑇## =
𝑀𝑅##
∑ 𝑀𝑅##(-)
/
-01
𝑛3
Maliciousness	Rating	– Sample	Distributions
Challenges	with	the	Approach
• How	can	we	best	define	the	cutting	scores	on	all	those	potential	
maliciousness	ratings?
• How	to	combine	and	weight	the	multivariate	composition	of	these	pivoting	
points?
• Solution	is	probably	unique	
per	company,	including	
understanding	telemetry	
patterns,	risk	appetite	for	FPs	
/	FNs	and	decision	points	on	
when	to	block	and	when	to	
alert	on	something.
What	if	the	challenges	had	been	solved?
A	More	Involved	Example	(1)
A	More	Involved	Example	(2)
Build	the	campaign	based	on	the	
relationships	- they	all	share	the	
same	support	infrastructure	on	
the	IP	Address	and	Name	
Servers.
Shia	LeBeouf Approves
One	more	thing…
Going	back	to	TIQ-Test
• Biggest	criticism	of	TIQ-Test	(mostly	self-inflicted)	is	that	is	was	
always	relative,	not	absolute.
• How	can	one	define	what	it	a	”good”	feed?
• Does	that	even	make	sense?
• It	is	easy	to	tell	if	a	feed	is	bad	(lots	of	FPs,	low	curation)
• My	thought	process:
• Maybe with	telemetry,	you	can	identify	an	”applicable”	feed
• Or	”actionable”	if	you	like	your	Cybersecurity	with	extra	camo
Actual	alert	
IOC	
accounting
Percentage	of	the	
matches	of	an	
specific	feed	that	
were	actual	alerts	
or		incidents	at	an	
organization
Actual	alert	
UNIQUE	IOC	
accounting
Percentage	of	
UNIQUE	(only	
contributed	by	
the	feed)	
matches	of	an	
specific	feed	
that	were	
actual	alerts	or	
incidents	at	an	
organization
Challenges	with	the	Approach	(2)
• How	does	one	define	a	valid	alert	or	incident?
• Not	many	ways	but	to	improve	understanding	and	growth	of	IR	practice:
• Your	own	incident	history	(for	the	1%-ers)
• Your	own	CTI	/	IOC	creation	processes	(for	the	0.01%-ers)
• The	”Telemetry	Test”	has	been	INVALUABLE	for	Niddel	on	partnership	and	
feed	selection
• ”My	Threat	Intelligence	Can	Beat	Up	Your	Threat	Intelligence”	(h/t	Rick	
Holland)
• How	much	values	does	a	feed	add	anyway?	Look	for	unique	contributions.
No	magic	this	time	– Improve	your	IR	processes
Takeaways
• Lots	of	ideas	to	implement,	go	go	go!!
• IOCs	(and	CTI	in	general	for	that	matter)	are	
not	a	complete	waste	of	time.	It’s	just	raw	
data,	and	needs	to	be	refined	in	order	to	be	
used	properly
• Bringing	automation	(and	simplicity	of	use)	
to	threat	intelligence	and	threat	hunting	is	
paramount	to	bring	its	usability	from	the	
1%	of	orgs	to	a	more	broad	audience	at	
scale
Thanks!
• Share,	like,	subscribe,	EDM	outro
• Q&A	and	Feedback	please!
Alex	Pinto	– alexcp@niddel.com
@alexcpsec
@NiddelCorp
Little	Bobby	Comics	by	@RobertMLee and	Jeff	Haas

More Related Content

What's hot

SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingAlex Pinto
 
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityAlex Pinto
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Alex Pinto
 
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption StrategiesJoshua R Nicholson
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Alex Pinto
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKElasticsearch
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinthchrissanders88
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Huntingchrissanders88
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin FalckNorth Texas Chapter of the ISSA
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationRaffael Marty
 
Databases, Web Services and Tools For Systems Immunology
Databases, Web Services and Tools For Systems ImmunologyDatabases, Web Services and Tools For Systems Immunology
Databases, Web Services and Tools For Systems ImmunologyYannick Pouliot
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramCarl C. Manion
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security DataRaffael Marty
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE - ATT&CKcon
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
 
Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017chrissanders88
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsThreatConnect
 

What's hot (20)

SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
 
BSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information SecurityBSidesLV 2013 - Using Machine Learning to Support Information Security
BSidesLV 2013 - Using Machine Learning to Support Information Security
 
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
 
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
2016 FS-ISAC Annual Summit (Miami) - Developing Effective Encryption Strategies
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
 
SOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation LabyrinthSOC2016 - The Investigation Labyrinth
SOC2016 - The Investigation Labyrinth
 
Abstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin FalckLuncheon 2016-07-16 -  Topic 2 - Advanced Threat Hunting by Justin Falck
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
 
Databases, Web Services and Tools For Systems Immunology
Databases, Web Services and Tools For Systems ImmunologyDatabases, Web Services and Tools For Systems Immunology
Databases, Web Services and Tools For Systems Immunology
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 

Similar to Beyond Matching: Applying Data Science Techniques to IOC-based Detection

Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesDemystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesPriyanka Aash
 
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOpsTechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOpsDicodingEvent
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big DataAmazon Web Services
 
2019 CDM CIO Summit AI Driven Development
2019 CDM CIO Summit AI Driven Development2019 CDM CIO Summit AI Driven Development
2019 CDM CIO Summit AI Driven DevelopmentChandra Gundlapalli
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldJames Wickett
 
AI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat DetectionAI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat DetectionDatabricks
 
How to teach your data scientist to leverage an analytics cluster with Presto...
How to teach your data scientist to leverage an analytics cluster with Presto...How to teach your data scientist to leverage an analytics cluster with Presto...
How to teach your data scientist to leverage an analytics cluster with Presto...Alluxio, Inc.
 
AI for Software Engineering
AI for Software EngineeringAI for Software Engineering
AI for Software EngineeringMiroslaw Staron
 
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...Akond Rahman
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security BrokersRobin Vermeirsch
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsPriyanka Aash
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24
 
Intelligently Automating Machine Learning, Artificial Intelligence, and Data ...
Intelligently Automating Machine Learning, Artificial Intelligence, and Data ...Intelligently Automating Machine Learning, Artificial Intelligence, and Data ...
Intelligently Automating Machine Learning, Artificial Intelligence, and Data ...Ali Alkan
 
The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data ScienceDaniel McEnnis
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile WorldDavid Lindner
 
Philips john huffman
Philips john huffmanPhilips john huffman
Philips john huffmanBigDataExpo
 

Similar to Beyond Matching: Applying Data Science Techniques to IOC-based Detection (20)

DITEC JAN 31 2015 (PDF)
DITEC JAN 31 2015 (PDF)DITEC JAN 31 2015 (PDF)
DITEC JAN 31 2015 (PDF)
 
Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use CasesDemystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use Cases
 
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOpsTechTalk 2021: Peran IT Security dalam Penerapan DevOps
TechTalk 2021: Peran IT Security dalam Penerapan DevOps
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data
 
2019 CDM CIO Summit AI Driven Development
2019 CDM CIO Summit AI Driven Development2019 CDM CIO Summit AI Driven Development
2019 CDM CIO Summit AI Driven Development
 
Adversary Driven Defense in the Real World
Adversary Driven Defense in the Real WorldAdversary Driven Defense in the Real World
Adversary Driven Defense in the Real World
 
AI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat DetectionAI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat Detection
 
How to teach your data scientist to leverage an analytics cluster with Presto...
How to teach your data scientist to leverage an analytics cluster with Presto...How to teach your data scientist to leverage an analytics cluster with Presto...
How to teach your data scientist to leverage an analytics cluster with Presto...
 
AI for Software Engineering
AI for Software EngineeringAI for Software Engineering
AI for Software Engineering
 
Is my app secure?
Is my app secure?Is my app secure?
Is my app secure?
 
Is My App Secure ?
 Is My App Secure ? Is My App Secure ?
Is My App Secure ?
 
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data Sets
 
Outpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOpsOutpost24 webinar: Turning DevOps and security into DevSecOps
Outpost24 webinar: Turning DevOps and security into DevSecOps
 
Intelligently Automating Machine Learning, Artificial Intelligence, and Data ...
Intelligently Automating Machine Learning, Artificial Intelligence, and Data ...Intelligently Automating Machine Learning, Artificial Intelligence, and Data ...
Intelligently Automating Machine Learning, Artificial Intelligence, and Data ...
 
The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data Science
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
Philips john huffman
Philips john huffmanPhilips john huffman
Philips john huffman
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Beyond Matching: Applying Data Science Techniques to IOC-based Detection