This document provides an overview of an "attack-driven defense" approach presented by the co-founder and CSO of Signal Sciences. The summary focuses on three key points:
1) The approach focuses on building defenses around real-world attack patterns by instrumenting detection mechanisms around the initial compromise, persistence/C2, and lateral movement stages of an attack.
2) Detection involves analyzing endpoint command logs to identify anomalous commands for non-technical users or unique command combinations/bursts for technical users. Common attack patterns are also flagged.
3) A host-based intrusion detection system called "Tripyarn" is presented, which aims to alert on common host-level persistence mechanisms used by attackers