Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Death to the IOC What's Next in Threat Intelligence

Автор: All Hacking Cons

Загружено: 2022-01-07

Просмотров: 29

Описание:

Death to the IOC: What's Next in Threat Intelligence
Bhavna Soman | Security Researcher, Microsoft
Location: South Seas ABE
Date: Thursday, August 8 | 9:00am-9:25am
Format: 25-Minute Briefings
Tracks: Data Forensics/Incident Response, Enterprise

Humans cannot scale to the amount of Threat Intelligence being generated. While the Security Community has mastered the use of machine readable feeds from OSINT systems or third party vendors, these usually provide IOCs or IOAs without contextual information. On the other hand, we have rich textual data that describes the operations of cyber attackers, their tools, tactics and procedures; contained in internal incident response reports, public blogs and white papers. Today, we can't automatically consume or use these data because they are composed of unstructured text. Threat Analysts manually go through them to extract information about adversaries most relevant to their threat model, but that manual work is a bottleneck for time and cost.

In this project we will automate this process using Machine Learning. We will share how we can use ML for Custom Entity Extraction to automatically extract entities specific to the cyber security domain from unstructured text. We will also share how this system can be used to generate insights such as:
Identify patterns of attacks an enterprise may have faced
Analyze the most effective attacker techniques against the enterprise they are defending
Extract trends of techniques used in the overall eco-system or a specific vertical industry

These insights can be used to make data backed decisions about where to invest in the defenses of an enterprise. And in this talk we will describe our solution for building an entity extraction system from public domain text specific to the security domain; using opensource ML tooling. The goal is to enable applied researchers to extract TI insights automatically, at scale and in real time.

We will cover:
The importance of this process for threat intelligence and share some examples of actionable insights we can provide as a result of this research
Overall Architecture of the system and ML principles used
How we automatically created a training dataset for our domain using a dictionary of entities
Supervised and unsupervised featurization methods we experimented with
Experimentation and results from Statistical Modeling methods and Deep Learning Methods
Recommendations and resources for Applied Researchers who may want to implement their own TI Extraction pipeline.Black Hat - USA - 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security

Death to the IOC What's Next in Threat Intelligence

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Death to the IOC: What's Next in Threat Intelligence

Death to the IOC: What's Next in Threat Intelligence

Attacking Electric Motors for Fun and Profit

Attacking Electric Motors for Fun and Profit

Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded Controller

Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded Controller

Lessons From Two Years of Crypto Audits

Lessons From Two Years of Crypto Audits

Код работает в 100 раз медленнее из-за ложного разделения ресурсов.

Код работает в 100 раз медленнее из-за ложного разделения ресурсов.

The Man Behind Google's AI Machine | Demis Hassabis Interview

The Man Behind Google's AI Machine | Demis Hassabis Interview

Microsoft begs for mercy

Microsoft begs for mercy

The Windows 11 Disaster That's Killing Microsoft

The Windows 11 Disaster That's Killing Microsoft

JOSE ALEJANDRO RIVAS   What your mother never told you about TEE

JOSE ALEJANDRO RIVAS What your mother never told you about TEE

I Read Honey's Source Code

I Read Honey's Source Code

Złoty Wiatr Nad Miastem – Muzyka, Która Daje Radość, Przy Której Chce się Żyć i Tańczyć

Złoty Wiatr Nad Miastem – Muzyka, Która Daje Radość, Przy Której Chce się Żyć i Tańczyć

Vergecast live at CES 2026 | The Vergecast

Vergecast live at CES 2026 | The Vergecast

JUAN ALONSO   La webcam   ese instrumento musical desconocido

JUAN ALONSO La webcam ese instrumento musical desconocido

Марк Андрессен: Правда об иммиграции и разнообразии, равенстве и инклюзивности.

Марк Андрессен: Правда об иммиграции и разнообразии, равенстве и инклюзивности.

The People versus Microsoft

The People versus Microsoft

Bill Gates STUNNED as Windows 12 Faces MASSIVE Backlash Before Launch!

Bill Gates STUNNED as Windows 12 Faces MASSIVE Backlash Before Launch!

MIKAEL CHALA   Seguridad en operadores móviles virtuales

MIKAEL CHALA Seguridad en operadores móviles virtuales

Source of Data for Business Vault Entities

Source of Data for Business Vault Entities

Jak Mossad osaczył sowieckiego snajpera „Czerwonego Wilka” w Berlinie

Jak Mossad osaczył sowieckiego snajpera „Czerwonego Wilka” w Berlinie

How to Prevent the New OAuth Attack Bypassing Microsoft Entra Authentication

How to Prevent the New OAuth Attack Bypassing Microsoft Entra Authentication

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com