Chris@CyberSparta.com www.cybersparta.com Neil@Cyberqgroup.com.com www.cyberqgroup.com.

Slides:



Advertisements
Similar presentations
Albert Gatt Corpora and Statistical Methods Lecture 13.
Advertisements

CPSC 502, Lecture 15Slide 1 Introduction to Artificial Intelligence (AI) Computer Science cpsc502, Lecture 15 Nov, 1, 2011 Slide credit: C. Conati, S.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
John Prisco President and CEO Triumfant, Inc. Our defenses are designed to defeat threats we have seen before. We have very little protection against.
THE NEED FOR CONTEXT 1 Applying Machine Learning to Incident Response Matt
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Cryptography and Network Security
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Get rid of SaveNShop ads infections
The Power of Using Artificial Intelligence
Introducing Precictive Analytics
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Proactive Incident Response
Protect your Digital Enterprise
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Bhakthi Liyanage SQL Saturday Atlanta 15 July 2017
ssue.
Machine Learning with Spark MLlib
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Ilija Jovičić Sophos Consultant.
Firmware threat Dhaval Chauhan MIS 534.
Discussion for: Broadening the data base for deepening the focus
Enterprise Mobility Suite Technical and Business Briefing
Outline Basic concepts in computer security
Machine Learning for Computer Security
Malware and Computer Maintenance
The Relationship between Deep Learning and Brain Function
Parallel Autonomous Cyber Systems Monitoring and Protection
Machine Learning overview Chapter 18, 21
Cyber Security: State of the Nation
Artificial Intelligence
Lecture 25 More Synchronized Data and Producer/Consumer Relationship
Evaluating a Real-time Anomaly-based IDS
Deep Learning Fundamentals online Training at GoLogica
Kaspersky Antivirus Updates for Trojan. Kaspersky could be a leading name within the field of antivirus protection solutions. The complete ensures up-to-date.
njh
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
How to Install and Use Malwarebytes Antivirus How to Install and Use Malwarebytes Antivirus Designed to supplement your antivirus software, Malwarebytes.
Call AVG Antivirus Support | Fix Your PC
Cybersecurity Insider Threat Analytics
Varonis Overview.
How to Operationalize Big Data Security Analytics
Baselining PMU Data to Find Patterns and Anomalies
PROACTIVE SNOOPING ANALYSIS
A Berkeley View of Systems Challenges for AI
Data Mining 資料探勘 分群分析 (Cluster Analysis) Min-Yuh Day 戴敏育
Panda Adaptive Defense Platform and Services
Intrusion Prevention Systems
Fire-wall.
3.1.1 Introduction to Machine Learning
ML – Lecture 3B Deep NN.
Overfitting and Underfitting
Integrating Deep Learning with Cyber Forensics
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Malware and how to defend against it
The Security Operations Hierarchy of Needs
Detection Detect the breach and protect the data. By,
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Machine Learning for Space Systems: Are We Ready?
6. Application Software Security
STEALTHbits Technologies, Inc.
Machine Learning in Business John C. Hull
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Cybersecurity Simplified: Phishing
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Chris@CyberSparta.com www.cybersparta.com Neil@Cyberqgroup.com.com www.cyberqgroup.com

146 days – the average time before an organisation discovers it has been internally compromised. Organisations generate huge volumes of fragmented data. Understanding the security threats within the data is increasingly challenging. You are only one zero day from being owned. Response and containment is critical

Why AI and ML? Artificial Intelligence is the broader concept of machines being able to carry out tasks in a way that we would consider “smart”. Machine Learning is a current application of AI based around the idea that we should really just be able to give machines access to data and let them learn for themselves Machine Learning is a subset of the larger field of Artificial Intelligence. At current levels of maturity, ML is mostly applied statistics. Most ML algorithms process a set of data and create a matrix of the characteristics. That matrix of characteristics is called your “model” and it will be used for evaluating additional data against. The model is the output of training your ML algorithm with data and is what is used to evaluate other data to determine what it is. When you use your ML model in hunting, for instance, you run new data against the model and the results are things that an analyst should then look at closer. Supervised machine learning uses labeled training data to make predictions about unlabeled data. Given a set of known good and known bad examples, you can create a binary classifier capable of taking in new transactions and deciding if they look more similar to the good training set or the bad training set. Supervised - you’ll need a set of data separated between the types you are trying to build your model to recognize. Unsupervised ML is essentially anomaly detection. Unsupervised ML is extremely powerful but usually better suited to broader use cases.

What are the key challenges in a SOC context? 1.Resources 2.Big picture 3.Event info - structured & unstructured 4.Perspectives 1)Experts, dealing with bigger haystacks [BD4S] 2)Overwhelmed, trade-offs, inter-relationships between fixes [SPECTRE] 3)Top10 – why? Much useful info is not structured – how to make sense? Risks? 4) Language needs to vary by persona – adaptive vizs?

A1.Resources

A2.The Big Picture

A3.Event/log info naive processing of event data - long term problem of storage of junk data

A4.Perspectives - Visualisations

CISO CEO Hacker Defender Conversation with AI Persona I Can Destroy You I Will Protect You Hacker Defender I Know My Risks How Secure Are We? CISO CEO

What are opportunities for ML in Security Operations? 1.Physical ML 2.Correlation 3.Enrichment 4.Incident Analysis 5.Malware Analysis 6.Anomalies 1)Switch camera example 2)Most common use. Closeness of fit? Degs of certainty? [BD4S] 3)“meta model” approach? 4)Learning from past incidents – trends? 5)Modelling/emulation, AMSEL, injection of symptoms 6)What is normal? Body temp vars?

B1. Physical ML Camera vs switch

B2. Correlation

B3. Enrichment

B4. Incident Analysis

B5. Malware Analysis

B6. Anomalies Understanding normality - sensitivity analysis cf temp changes

Current innovations – evaluating effectiveness 1.Mock attacks 2.UEBA 3.Analyst behaviour 4.Intel Analysis 5.Method Analysis 1)Test envts, injection of malware symptoms 2)UEBA? Economics? 3)What are they good at – and not? Where support needed? 4)What sources of intel/info work best and when? 5)What methods have most success in detection and when?

C1. Mock Attacks Computer is running extremely slow (seems like a VIRUS) Antivirus and firewall protection is unexpectedly disabled Modifications on the Registry Unwanted toolbars on your Web Browser Even if you remove them, they might return each time you restart your computer Unfamiliar and peculiar error messages Programs won’t run or files won’t open Can’t access certain drives on your computer File sizes

C2. UEBA UEBA detects and stops an insider threats Account Compromise Employee monitoring Identity access management Privileged account use Cloud application security

C3. Analyst Behavior Analysis

C4. Analysis of intelligence sources

C5. Analysis of Methods

Current innovations – continuous improvement 1.Training ML algorithms 2.Resource prioritization 3. Flexible consumption 4. Adaptation 1)Sensitivity analysis etc 2)Switch to most effective resources 3) Use of intel resources e.g. CASBs? 4)AADSS approach

D1. Resource prioritisation

D2. Flexible consumption CASBs etc

D3. ML Adaptation AADSS

Summary

THANKS TO HELPERS !!!!!