SlideShare a Scribd company logo
Preview of Vulture’s upcoming web
filtering engine
Pass the SALT 2018.
Security And Libre Talks.
2-4 juillet 2018 - Lille, France.
Vulture ?
• A brief history
• 2003: Linux software (httpd / mod_perl + PHP Web UI)
• 2016: FreeBSD Cluster (pf, haproxy, httpd + Django Web UI)
• Web SSO: mod_vulture + django portal
• Web application firewall
• Clustered mod_security, using hiredis [blacklisting]
• mod_defender, aka "Naxsi for Apache2" [whitelisting]
• mod_svm [machine learning]
Vulture’s current filtering engine
Client
FreeBSD pf
Apache
httpd
IP Reputation
GeoIP
mod_defender
mod_security
mod_vulture
mod_svm
Immediate block
Immediate block
Authentication &SSO
Request scoring ++
Request scoring ++
Request scoring ++
Current limits
• Works well
• No performance issue, but we can do much better
• 3 engines => quite complex
• Code overlapping
• Complex UI, httpd knowledge recommended
• Rule-based approach
• Human-based approach
• Time consuming
• Need tuning
• Not mistake proof configuration
The need for a better, unified engine
• Focused on performance
• High availability required
• Precision and intelligence
• No bullshit
• Simplicity -> For users AND for filter devs
Internal name: « D.A.R.W.I.N. »
Overview
Architecture
Overview: XSS Filter
XSS
Core
Filter
Filter
Thread 1
Thread 2
Thread 3
Thread 4
...
Thread N
Monitoring
UNIX
Socket
HTTP POST BODY
XSS Score: 87%
Overview: Filter Workflow
Filter 1 (ex: reputation)
Filter 2 (ex: SQLi)
Filter N
D.A.R.W.I.N.
Overview: Filter Workflow
Filter 1 (ex: reputation)
Filter 2 (ex: SQLi) Manager
Management
Socket
Filter N
D.A.R.W.I.N.
Performance ?
• HAProxy asynchronousevents
• C/C++14
• UNIX socket
• Shared in-memory cache (REDIS)
• Context-sharing between filters among the Vulture cluster
• Used by Darwin’s Neural Networks to track events in time
• Supports GPU acceleration
• TensorFlow as AI library
High Availability
Filter N
Decision Manager
Management Socket
{"type":"update_filters","filters":["Decision"]}
High Availability
Filter N
Decision
Decision
Manage
r
Management Socket
{"type":"update_filters","filters":["Decision"]}
Manager
High Availability
Filter N
Decision
Decision
Manage
r
Management Socket
{"type":"update_filters","filters":["Decision"]}
Manager
High Availability
Filter N
Decision
Manager
Management Socket
{"type":"update_filters","filters":["Decision"]}
{"status":"OK"}
Manager
Precision and Intelligence
• Precision
• Multiple small filters
• Very efficient for one unit task
• Ability to chain filters (workflow)
• Intelligence
• Decision filter based on Artificial Intelligence
• Prediction based on filters’ results
• Active learning capabilities: Interact with human to correct itself
• Human focuses on high-level “decisions”
• The AI manages the technical security rules
No Bullshit
• Heuristic / basic correlation in a black box is not AI
• Those methods are promising but…
• We use some of them in v3 (SVM, regression…)
• Few false-positives
• Unfortunately, few false-negatives: rules still needed
• We work hard to take it to the next level!
• “AI first”: by design, not an add-on component
• Excellent results so far, beta-version coming this year
Simplicity
• Easy for users
• Minimalist configuration
• Autonomoussystem
• Simple feedback (Normal or Malicious request)
• Easy for developers
• Filters mostly independent
• Simple SDK
• On Github soon ;)
Portable
• Replace HAProxy with anything you want
• Simply develop a connector
• Not only HTTP !
• Real world example (aDvens): DARWIN + Rsyslog
• mmdarwin plugin
• Real time log analysis
• Real time log enrichment
• On Github soon… ;)
Questions ?
hugo.soszynski@advens.fr
jeremie.jourdin@advens.fr
https://www.vultureproject.org
https://github.com/VultureProject/mod_defender
https://github.com/VultureProject/darwin (coming soon)
Thank You !

More Related Content

Similar to Vulture next filtering engine

NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
Atif Ghauri
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_
EndgameInc
 
Monitorama 2015 Netflix Instance Analysis
Monitorama 2015 Netflix Instance AnalysisMonitorama 2015 Netflix Instance Analysis
Monitorama 2015 Netflix Instance Analysis
Brendan Gregg
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
Joff Thyer
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Denim Group
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
sedukull
 
Resolving problems & high availability
Resolving problems & high availabilityResolving problems & high availability
Resolving problems & high availability
Zend by Rogue Wave Software
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
Flaskdata.io
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
isc2-hellenic
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon china
Peter Hlavaty
 
Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...
Sanjay Willie
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Guglielmo Iozzia
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
Robert Conti Jr.
 
Real time web
Real time webReal time web
Real time web
Medhat Dawoud
 
Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018
Nicolas Destor
 
MySQL Monitoring Shoot Out
MySQL Monitoring Shoot OutMySQL Monitoring Shoot Out
MySQL Monitoring Shoot Out
Kris Buytaert
 
Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)
ClubHack
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger Blockchain
Afraz Khan
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
NCC Group
 
Sensu and Sensibility - Puppetconf 2014
Sensu and Sensibility - Puppetconf 2014Sensu and Sensibility - Puppetconf 2014
Sensu and Sensibility - Puppetconf 2014
Tomas Doran
 

Similar to Vulture next filtering engine (20)

NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_
 
Monitorama 2015 Netflix Instance Analysis
Monitorama 2015 Netflix Instance AnalysisMonitorama 2015 Netflix Instance Analysis
Monitorama 2015 Netflix Instance Analysis
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
Resolving problems & high availability
Resolving problems & high availabilityResolving problems & high availability
Resolving problems & high availability
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
Security research over Windows #defcon china
Security research over Windows #defcon chinaSecurity research over Windows #defcon china
Security research over Windows #defcon china
 
Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...Functionality, security and performance monitoring of web assets (e.g. Joomla...
Functionality, security and performance monitoring of web assets (e.g. Joomla...
 
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
Building a data pipeline to ingest data into Hadoop in minutes using Streamse...
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
Real time web
Real time webReal time web
Real time web
 
Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018
 
MySQL Monitoring Shoot Out
MySQL Monitoring Shoot OutMySQL Monitoring Shoot Out
MySQL Monitoring Shoot Out
 
Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger Blockchain
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 
Sensu and Sensibility - Puppetconf 2014
Sensu and Sensibility - Puppetconf 2014Sensu and Sensibility - Puppetconf 2014
Sensu and Sensibility - Puppetconf 2014
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Vulture next filtering engine

  • 1. Preview of Vulture’s upcoming web filtering engine Pass the SALT 2018. Security And Libre Talks. 2-4 juillet 2018 - Lille, France.
  • 2. Vulture ? • A brief history • 2003: Linux software (httpd / mod_perl + PHP Web UI) • 2016: FreeBSD Cluster (pf, haproxy, httpd + Django Web UI) • Web SSO: mod_vulture + django portal • Web application firewall • Clustered mod_security, using hiredis [blacklisting] • mod_defender, aka "Naxsi for Apache2" [whitelisting] • mod_svm [machine learning]
  • 3. Vulture’s current filtering engine Client FreeBSD pf Apache httpd IP Reputation GeoIP mod_defender mod_security mod_vulture mod_svm Immediate block Immediate block Authentication &SSO Request scoring ++ Request scoring ++ Request scoring ++
  • 4. Current limits • Works well • No performance issue, but we can do much better • 3 engines => quite complex • Code overlapping • Complex UI, httpd knowledge recommended • Rule-based approach • Human-based approach • Time consuming • Need tuning • Not mistake proof configuration
  • 5. The need for a better, unified engine • Focused on performance • High availability required • Precision and intelligence • No bullshit • Simplicity -> For users AND for filter devs Internal name: « D.A.R.W.I.N. »
  • 7. Overview: XSS Filter XSS Core Filter Filter Thread 1 Thread 2 Thread 3 Thread 4 ... Thread N Monitoring UNIX Socket HTTP POST BODY XSS Score: 87%
  • 8. Overview: Filter Workflow Filter 1 (ex: reputation) Filter 2 (ex: SQLi) Filter N D.A.R.W.I.N.
  • 9. Overview: Filter Workflow Filter 1 (ex: reputation) Filter 2 (ex: SQLi) Manager Management Socket Filter N D.A.R.W.I.N.
  • 10. Performance ? • HAProxy asynchronousevents • C/C++14 • UNIX socket • Shared in-memory cache (REDIS) • Context-sharing between filters among the Vulture cluster • Used by Darwin’s Neural Networks to track events in time • Supports GPU acceleration • TensorFlow as AI library
  • 11. High Availability Filter N Decision Manager Management Socket {"type":"update_filters","filters":["Decision"]}
  • 12. High Availability Filter N Decision Decision Manage r Management Socket {"type":"update_filters","filters":["Decision"]} Manager
  • 13. High Availability Filter N Decision Decision Manage r Management Socket {"type":"update_filters","filters":["Decision"]} Manager
  • 14. High Availability Filter N Decision Manager Management Socket {"type":"update_filters","filters":["Decision"]} {"status":"OK"} Manager
  • 15. Precision and Intelligence • Precision • Multiple small filters • Very efficient for one unit task • Ability to chain filters (workflow) • Intelligence • Decision filter based on Artificial Intelligence • Prediction based on filters’ results • Active learning capabilities: Interact with human to correct itself • Human focuses on high-level “decisions” • The AI manages the technical security rules
  • 16. No Bullshit • Heuristic / basic correlation in a black box is not AI • Those methods are promising but… • We use some of them in v3 (SVM, regression…) • Few false-positives • Unfortunately, few false-negatives: rules still needed • We work hard to take it to the next level! • “AI first”: by design, not an add-on component • Excellent results so far, beta-version coming this year
  • 17. Simplicity • Easy for users • Minimalist configuration • Autonomoussystem • Simple feedback (Normal or Malicious request) • Easy for developers • Filters mostly independent • Simple SDK • On Github soon ;)
  • 18. Portable • Replace HAProxy with anything you want • Simply develop a connector • Not only HTTP ! • Real world example (aDvens): DARWIN + Rsyslog • mmdarwin plugin • Real time log analysis • Real time log enrichment • On Github soon… ;)