SlideShare a Scribd company logo
1 of 19
Download to read offline
Facebook Immune System
人人安全中心 姚海阔
Immune

• A realtime system to protect our users and the
  social graph

• Big data, Real time
  – 25B checks per day
  – 650K per second at peak
  – Realtime checks and classifications on every read and
    write actions
Agenda


• 1 Threats

• 2 Adversarial Learning

• 3 System Design

• 4 Summary
Protect the Graph

• Threats to the social graph can be tracked to
  three root causes.
  – Compromised accounts
     • return
  – Fake accounts
     • delete
  – Creepers
     • educate
Compromised Accounts

• Phishing
  – The trust is a target for manipulation
  – IP and successive geo-distance


• Malware
  – Target the propagation vector
  – using user feedback
  – require Turing tests*
Fake Accounts

• Created by both scripts and raw labor
  – overcome rate limits
  – boost the reputation or ranking
  – Short lifetime


• Fake accounts have limited virality because they
  are not central nodes and lack trusted connections
  – Comments and wall posts on pages
Creepers

• Unwanted friend requests
  – Beauty hunter


• Chain letters
  – motivate users to take damaging actions on false
    pretenses
  – create a global misinformation wall that hides critical
    or time-sensitive information
Balance of Power

• What the attackers have:
  – Labor. They have much more
  – Distributed botnets, compromised webhosts, infected
    zombies
  – Fake and compromised objects (events, apps, pages,
    groups, users, …)
• What we have:
  –   Data centers, content distribution networks
  –   User feedback -- spam reports, feed hides, friend rejects
  –   Knowledge of patterns and anomalies
  –   Shared secrets with users
Adversarial

• Adversarial learning
  – The attacker works to hide patterns and subvert
    detection
  – The system must respond fast and target the
    features that are most expensive for the attacker
    to change
  – not to overfit on the superficial features that are
    easy for the attacker to change*
Circle

• The defender seeks to shorten Attack and
  Detect while lengthening Defense and
  Mutate
Method

• The Attack phase
  – better user feedback
  – more effective unsupervised learning and anomaly
    detection.
• The Detect phase
  – quickly building and deploying new features and
    models.
• The defense and mutate phases
  – making it harder for the attacker to detect and adapt
  – obscuring responses and subverting attack canaries*
Phishing Case
Graph and User Protection
Main components


• Classifier services
   – SVM, Random Forest, Logistic Regression, Boosting
• Feature Extraction Language (FXL)
   – Dynamically executed language for expressing features and rules
• Dynamic model loading
   – Load online into classifier services, without service or tailer restart
• Policy Engine
   – Express business logic, policy
   – Trigger responses:blocking , authentication challenge, disabling an
     account.
• Feature Loops (Floops)
Sigma: High-level design
Feature Loops (an FXL feature provider)


• Inner Floop ( counters ), 10ms latency, Memcache
  – The number of login failures per IP
  – Number of users that cleared User Experience per IP
  – Rate that app has published to Feed
• Middle Floop ( tailers ), 10s latency, Scribe HDFS
  – The number of times a domain has been sent in a message
  – Trigger recomputation of friend network coherence
• Outer Floop (Hive), 1d latency
  – Unique users disabled from an IP over past 15d
  – Number of users with given name per country and gender
Challenges


• Lack of a clean data layer. Opaque data
  definition
• Feature reliability
• Many channels, and they evolve
• Actionable detection
• Scaling to deeper classification at display-time
Summary


• Response.
  – Response form and latency are really important


• Features.
  – Make it easy to try out new features and models


• Sharing.
  – Share feature data across channels
Facebook immune system yao

More Related Content

Viewers also liked

CAF Garcia
CAF GarciaCAF Garcia
CAF Garciacgla
 
Plan Nord
Plan NordPlan Nord
Plan Nordcgla
 
BT Olympics
BT OlympicsBT Olympics
BT Olympicscgla
 
MTA LIRR
MTA LIRRMTA LIRR
MTA LIRRcgla
 
Vnesheconombank PPP Centre
Vnesheconombank PPP CentreVnesheconombank PPP Centre
Vnesheconombank PPP Centrecgla
 
TXDOT
TXDOTTXDOT
TXDOTcgla
 
VaDOT
VaDOTVaDOT
VaDOTcgla
 
BLP Cities
BLP CitiesBLP Cities
BLP Citiescgla
 
Plan Nord - McCooe
Plan Nord - McCooePlan Nord - McCooe
Plan Nord - McCooecgla
 
Khalifa Port
Khalifa PortKhalifa Port
Khalifa Portcgla
 
Blaise Diagne Airport
Blaise Diagne AirportBlaise Diagne Airport
Blaise Diagne Airportcgla
 
Dutch PPP
Dutch PPPDutch PPP
Dutch PPPcgla
 

Viewers also liked (16)

Diaporama
DiaporamaDiaporama
Diaporama
 
CAF Garcia
CAF GarciaCAF Garcia
CAF Garcia
 
Plan Nord
Plan NordPlan Nord
Plan Nord
 
BT Olympics
BT OlympicsBT Olympics
BT Olympics
 
MTA LIRR
MTA LIRRMTA LIRR
MTA LIRR
 
Anil
AnilAnil
Anil
 
Vnesheconombank PPP Centre
Vnesheconombank PPP CentreVnesheconombank PPP Centre
Vnesheconombank PPP Centre
 
TXDOT
TXDOTTXDOT
TXDOT
 
VaDOT
VaDOTVaDOT
VaDOT
 
BLP Cities
BLP CitiesBLP Cities
BLP Cities
 
Plan Nord - McCooe
Plan Nord - McCooePlan Nord - McCooe
Plan Nord - McCooe
 
Absensi foto
Absensi fotoAbsensi foto
Absensi foto
 
信息安全监控
信息安全监控信息安全监控
信息安全监控
 
Khalifa Port
Khalifa PortKhalifa Port
Khalifa Port
 
Blaise Diagne Airport
Blaise Diagne AirportBlaise Diagne Airport
Blaise Diagne Airport
 
Dutch PPP
Dutch PPPDutch PPP
Dutch PPP
 

Similar to Facebook immune system yao

ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.pptch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.pptgealehegn
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunk
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud preventionYury Leonychev
 
hacking lecture 3c.ppt
hacking lecture 3c.ppthacking lecture 3c.ppt
hacking lecture 3c.pptpeter722626
 
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaShivamSharma909
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineerShivamSharma909
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004Jason Hong
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud preventionRakuten Group, Inc.
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance SHIKHA GAUTAM
 
Fluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data ConclaveFluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data Conclavefluturads
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsSecureDocs
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,Olajide Kuku
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerceMentalist Akram
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 

Similar to Facebook immune system yao (20)

ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.pptch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
SplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCPSplunkLive! Customer Presentation – UMCP
SplunkLive! Customer Presentation – UMCP
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
 
hacking lecture 3c.ppt
hacking lecture 3c.ppthacking lecture 3c.ppt
hacking lecture 3c.ppt
 
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agendaOffensive cyber security engineer pragram course agenda
Offensive cyber security engineer pragram course agenda
 
Offensive cyber security engineer
Offensive cyber security engineerOffensive cyber security engineer
Offensive cyber security engineer
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance
 
Fluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data ConclaveFluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data Conclave
 
OWASP Top Ten in Practice
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in Practice
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,
 
Threats
ThreatsThreats
Threats
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerce
 
ch08.ppt
ch08.pptch08.ppt
ch08.ppt
 
Intruders
IntrudersIntruders
Intruders
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Facebook immune system yao

  • 2. Immune • A realtime system to protect our users and the social graph • Big data, Real time – 25B checks per day – 650K per second at peak – Realtime checks and classifications on every read and write actions
  • 3. Agenda • 1 Threats • 2 Adversarial Learning • 3 System Design • 4 Summary
  • 4. Protect the Graph • Threats to the social graph can be tracked to three root causes. – Compromised accounts • return – Fake accounts • delete – Creepers • educate
  • 5. Compromised Accounts • Phishing – The trust is a target for manipulation – IP and successive geo-distance • Malware – Target the propagation vector – using user feedback – require Turing tests*
  • 6. Fake Accounts • Created by both scripts and raw labor – overcome rate limits – boost the reputation or ranking – Short lifetime • Fake accounts have limited virality because they are not central nodes and lack trusted connections – Comments and wall posts on pages
  • 7. Creepers • Unwanted friend requests – Beauty hunter • Chain letters – motivate users to take damaging actions on false pretenses – create a global misinformation wall that hides critical or time-sensitive information
  • 8. Balance of Power • What the attackers have: – Labor. They have much more – Distributed botnets, compromised webhosts, infected zombies – Fake and compromised objects (events, apps, pages, groups, users, …) • What we have: – Data centers, content distribution networks – User feedback -- spam reports, feed hides, friend rejects – Knowledge of patterns and anomalies – Shared secrets with users
  • 9. Adversarial • Adversarial learning – The attacker works to hide patterns and subvert detection – The system must respond fast and target the features that are most expensive for the attacker to change – not to overfit on the superficial features that are easy for the attacker to change*
  • 10. Circle • The defender seeks to shorten Attack and Detect while lengthening Defense and Mutate
  • 11. Method • The Attack phase – better user feedback – more effective unsupervised learning and anomaly detection. • The Detect phase – quickly building and deploying new features and models. • The defense and mutate phases – making it harder for the attacker to detect and adapt – obscuring responses and subverting attack canaries*
  • 13. Graph and User Protection
  • 14. Main components • Classifier services – SVM, Random Forest, Logistic Regression, Boosting • Feature Extraction Language (FXL) – Dynamically executed language for expressing features and rules • Dynamic model loading – Load online into classifier services, without service or tailer restart • Policy Engine – Express business logic, policy – Trigger responses:blocking , authentication challenge, disabling an account. • Feature Loops (Floops)
  • 16. Feature Loops (an FXL feature provider) • Inner Floop ( counters ), 10ms latency, Memcache – The number of login failures per IP – Number of users that cleared User Experience per IP – Rate that app has published to Feed • Middle Floop ( tailers ), 10s latency, Scribe HDFS – The number of times a domain has been sent in a message – Trigger recomputation of friend network coherence • Outer Floop (Hive), 1d latency – Unique users disabled from an IP over past 15d – Number of users with given name per country and gender
  • 17. Challenges • Lack of a clean data layer. Opaque data definition • Feature reliability • Many channels, and they evolve • Actionable detection • Scaling to deeper classification at display-time
  • 18. Summary • Response. – Response form and latency are really important • Features. – Make it easy to try out new features and models • Sharing. – Share feature data across channels