SlideShare a Scribd company logo
Anomaly Detection for Security
Cody Rioux - @codyrioux
Real-Time Analytics - Insight Engineering
Overview.
● Real-Time Analytics
● Anomaly: Fast Incident Detection
○ Techniques
○ Case Study: Detecting Phishing
○ Challenges: Base Rate Fallacy
● Outlier: Identifying Rogue Agents
○ Clustering
○ Case Study: Cleaning Up Rogue Agents
● Recap
We are drowning in information but starved for knowledge.
- John Naisbitt
Real-Time Analytics
Real-Time Analytics
● Part of Insight Engineering.
● Build systems that make intelligent decisions about our operational environment.
○ Make decisions in near real-time.
○ Automate actions in the production environment.
● Support operational availability and reliability.
Terminology
Outlier Anomaly
Case Study: Phishing
● Just hired as the only security staff at a startup.
● Fell victim to a phishing attack last week.
○ They did not know it happened when it was happening.
○ They did not know what to do about it
● You’re tasked with solving this problem.
Incident Detection for Stats Geeks
Anomaly Detection
Unexpected
value for a
given
generating
mechanism.
Terminology
Outlier Anomaly
Anomaly Detection for Security
Anomaly Detection for Security
Techniques
Basic
● Static thresholds
● Exponential Smoothing
● Three-sigma rule
Advanced
● Robust Anomaly Detection (RAD) - Netflix
● Kolmogorov-Smirnov
● Highest density interval (HDI)
● t-digest
● Linear models
Anomaly Detection for Security
Anomaly Detection for Security
Anomaly Detection for Security
Anomaly Detection for Security
Anomaly Detection for Security
Techniques
Basic
● Static thresholds - Doesn’t play well with nonstationary signals.
● Exponential Smoothing - Black Swan days like Christmas, Superbowl cause issues.
● Three-sigma rule - Works (very) well only for signals drawn from a Gaussian.
Show me the Money!
● No threshold configuration
● We require examples of normal, not examples of anomaly
● Automatically adapt to moving signals
● Higher accuracy enables automatic reaction
● Ensemble (combination) of techniques eliminates some
downsides
Base Rate Fallacy
Intrusion is comparatively rare
which affords you many
opportunities to generate a false
positive.
Base Rate Fallacy
● 10,000 log entries
● 99% Accuracy
● 0.01% Intrusions
1 Real incident
100 false + and 10% chance of false -
Case Study
So far we can automatically alert
interested parties to the possibility
of an intrusion.
Identifying Rogue Agents in a Production Environment
Outlier Detection
Anomaly Detection for Security
Rogue Agents?
● Identify brute force attempts on login systems
● Flag cheaters in online video games
● Identify participating ip addresses in a
phishing scam
Terminology
Outlier Anomaly
Case Study Revisited
You’ve devised an automated
technique for identifying attacks,
now we require an autonomous
system for remediation of attacks.
Goal: identify accounts and IP
Addresses that are not behaving like
their peers.
Clustering
● DBSCAN
● K-Means
● Gaussian Mixture Models
Conceptually
● If a point belongs to a group it should be near lots of other points as measured by
some distance function.
Anomaly Detection for Security
Case Study Revisited
Lets cluster accounts based on
their login habits and initiate an
automatic password reset and
notification.
Case Study Revisited
Lets cluster IP addresses based
on their login habits and
automatically ban them.
Full stack autonomous incident detection and remediation.
Recap
Case Study Recap
● Anomaly Detection enables us to...
○ Automatically identify potential attacks in real-time.
○ Notify interested parties of the attack.
○ React to those attacks without user intervention.
● Outlier Detection with Clustering enables us to…
○ Identify rogue agents within the environment.
○ Reset customer passwords for potentially compromised accounts.
○ Ban IP Addresses identified to be participating in the phishing scheme.
Literature
Machine Learning: The High
Interest Credit Card of Technical
Debt (Sculley et al., 2014)
Literature
● The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection
(Alexsson, 1999)
● Practical Machine Learning: A New Look at Anomaly Detection (Dunning, 2014)
● ALADIN: Active Learning of Anomalies to Detect Intrusion (Stokes and Platt, 2008)
● Distinguishing cause from effect using observational data: methods and
benchmarks (Mooij et al., 2014)
● Enhancing Performance Prediction Robustness by Combining Analytical Modeling
and Machine Learning (Didona et al., 2015)
Implementations
● Robust Anomaly Detection (RAD) - Netflix
● Seasonal Hybrid ESD - Twitter
● Extendible Generic Anomaly Detection
System (EGADS) - Yahoo
● Kale - Etsy
Questions?
crioux@netflix.com
@codyrioux
linkedin.com/in/codyrioux

More Related Content

PPTX
A review of machine learning based anomaly detection
PDF
Computer security - A machine learning approach
PPTX
When Cyber Security Meets Machine Learning
PDF
DOCX
Network intrusion detection using supervised machine learning technique with ...
DOCX
Weapon detection using artificial intelligence and deep learning for security...
PPTX
Cognitive Computing in Security with AI
PPTX
To use the concept of Data Mining and machine learning concept for Cyber secu...
A review of machine learning based anomaly detection
Computer security - A machine learning approach
When Cyber Security Meets Machine Learning
Network intrusion detection using supervised machine learning technique with ...
Weapon detection using artificial intelligence and deep learning for security...
Cognitive Computing in Security with AI
To use the concept of Data Mining and machine learning concept for Cyber secu...

What's hot (19)

PPTX
Malware Detection Using Machine Learning Techniques
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
PDF
DB-OLS: An Approach for IDS1
DOCX
robust malware detection for iot devices using deep eigen space learning
PDF
Volume 2-issue-6-2190-2194
PDF
AI approach to malware similarity analysis: Maping the malware genome with a...
PPTX
Cyber intrusion
PDF
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
PDF
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
PDF
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
PDF
IRJET- Improving Cyber Security using Artificial Intelligence
PPT
Intrusion Detection
PDF
IRJET- Android Malware Detection using Machine Learning
PPTX
Role of data mining in cyber security
PDF
Intrusion Detection System - False Positive Alert Reduction Technique
PPT
PPTX
Databse Intrusion Detection Using Data Mining Approach
ODP
Malware Dectection Using Machine learning
DOCX
A malware detection method for health sensor data based on machine learning
Malware Detection Using Machine Learning Techniques
Optimized Intrusion Detection System using Deep Learning Algorithm
DB-OLS: An Approach for IDS1
robust malware detection for iot devices using deep eigen space learning
Volume 2-issue-6-2190-2194
AI approach to malware similarity analysis: Maping the malware genome with a...
Cyber intrusion
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Real Time Intrusion Detection System Using Computational Intelligence and Neu...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
IRJET- Improving Cyber Security using Artificial Intelligence
Intrusion Detection
IRJET- Android Malware Detection using Machine Learning
Role of data mining in cyber security
Intrusion Detection System - False Positive Alert Reduction Technique
Databse Intrusion Detection Using Data Mining Approach
Malware Dectection Using Machine learning
A malware detection method for health sensor data based on machine learning
Ad

Viewers also liked (20)

PPTX
The Dark of Building an Production Incident Syste
PPTX
Traffic anomaly detection and attack
PPTX
Anomaly Detection for Real-World Systems
PPTX
Where is Data Going? - RMDC Keynote
PDF
Parallel Programming in Python: Speeding up your analysis
PPTX
Can a monitoring tool pass the turing test
PPTX
Monitoring without alerts
PPTX
Monitoring large scale Docker production environments
PPTX
The Dark Art of Production Alerting
PPTX
PyGotham 2016
PPTX
The definition of normal - An introduction and guide to anomaly detection.
PDF
SSL Certificate Expiration and Howler Monkey's Inception
PDF
Cloud Tech III: Actionable Metrics
PDF
Python Through the Back Door: Netflix Presentation at CodeMash 2014
PPTX
Monitoring Docker Application in Production
PPTX
Ruxit - How we launched a global monitoring platform on AWS in 80 days.
PDF
Anomaly Detection for Global Scale at Netflix
PPTX
Five Things I Learned While Building Anomaly Detection Tools - Toufic Boubez ...
PDF
Anomaly Detection at Scale
PDF
Operational Insight: Concepts and Examples (w/o Presenter Notes)
The Dark of Building an Production Incident Syste
Traffic anomaly detection and attack
Anomaly Detection for Real-World Systems
Where is Data Going? - RMDC Keynote
Parallel Programming in Python: Speeding up your analysis
Can a monitoring tool pass the turing test
Monitoring without alerts
Monitoring large scale Docker production environments
The Dark Art of Production Alerting
PyGotham 2016
The definition of normal - An introduction and guide to anomaly detection.
SSL Certificate Expiration and Howler Monkey's Inception
Cloud Tech III: Actionable Metrics
Python Through the Back Door: Netflix Presentation at CodeMash 2014
Monitoring Docker Application in Production
Ruxit - How we launched a global monitoring platform on AWS in 80 days.
Anomaly Detection for Global Scale at Netflix
Five Things I Learned While Building Anomaly Detection Tools - Toufic Boubez ...
Anomaly Detection at Scale
Operational Insight: Concepts and Examples (w/o Presenter Notes)
Ad

Similar to Anomaly Detection for Security (20)

PPTX
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
PDF
Strata 2014 Anomaly Detection
PPTX
A review of machine learning based anomaly detection
PDF
Strata 2014-tdunning-anomaly-detection-140211162923-phpapp01
PPTX
Splunk live! Customer Presentation – Prelert
PDF
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
PDF
AI in anomaly detection.pdf
PPTX
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
PDF
AI in anomaly detection - An Overview.pdf
PDF
Anomaly detection (Unsupervised Learning) in Machine Learning
PDF
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
PDF
A review of anomaly based intrusions detection in multi tier web applications
PDF
A review of anomaly based intrusions detection in multi tier web applications
PDF
A review of anomaly based intrusions detection in
DOC
Enhancing SIEM Correlation Rules Through Baselining
DOC
Log management siem 5651 sayılı yasa
PDF
A Comprehensive Introduction to Anomaly Detection in Machine Learning | USAII®
DOCX
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
PDF
Review of Intrusion and Anomaly Detection Techniques
PPTX
Anomaly Detection - New York Machine Learning
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Strata 2014 Anomaly Detection
A review of machine learning based anomaly detection
Strata 2014-tdunning-anomaly-detection-140211162923-phpapp01
Splunk live! Customer Presentation – Prelert
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
AI in anomaly detection.pdf
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
AI in anomaly detection - An Overview.pdf
Anomaly detection (Unsupervised Learning) in Machine Learning
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
A review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in
Enhancing SIEM Correlation Rules Through Baselining
Log management siem 5651 sayılı yasa
A Comprehensive Introduction to Anomaly Detection in Machine Learning | USAII®
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Review of Intrusion and Anomaly Detection Techniques
Anomaly Detection - New York Machine Learning

Recently uploaded (20)

PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
climate analysis of Dhaka ,Banglades.pptx
PDF
Mega Projects Data Mega Projects Data
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPTX
IB Computer Science - Internal Assessment.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Introduction to Knowledge Engineering Part 1
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Computer network topology notes for revision
PDF
Foundation of Data Science unit number two notes
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
annual-report-2024-2025 original latest.
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PDF
Lecture1 pattern recognition............
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
STUDY DESIGN details- Lt Col Maksud (21).pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
climate analysis of Dhaka ,Banglades.pptx
Mega Projects Data Mega Projects Data
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
IB Computer Science - Internal Assessment.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Clinical guidelines as a resource for EBP(1).pdf
Introduction to Knowledge Engineering Part 1
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Computer network topology notes for revision
Foundation of Data Science unit number two notes
Miokarditis (Inflamasi pada Otot Jantung)
IBA_Chapter_11_Slides_Final_Accessible.pptx
annual-report-2024-2025 original latest.
Business Ppt On Nestle.pptx huunnnhhgfvu
Lecture1 pattern recognition............
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg

Anomaly Detection for Security

  • 1. Anomaly Detection for Security Cody Rioux - @codyrioux Real-Time Analytics - Insight Engineering
  • 2. Overview. ● Real-Time Analytics ● Anomaly: Fast Incident Detection ○ Techniques ○ Case Study: Detecting Phishing ○ Challenges: Base Rate Fallacy ● Outlier: Identifying Rogue Agents ○ Clustering ○ Case Study: Cleaning Up Rogue Agents ● Recap
  • 3. We are drowning in information but starved for knowledge. - John Naisbitt Real-Time Analytics
  • 4. Real-Time Analytics ● Part of Insight Engineering. ● Build systems that make intelligent decisions about our operational environment. ○ Make decisions in near real-time. ○ Automate actions in the production environment. ● Support operational availability and reliability.
  • 6. Case Study: Phishing ● Just hired as the only security staff at a startup. ● Fell victim to a phishing attack last week. ○ They did not know it happened when it was happening. ○ They did not know what to do about it ● You’re tasked with solving this problem.
  • 7. Incident Detection for Stats Geeks Anomaly Detection
  • 12. Techniques Basic ● Static thresholds ● Exponential Smoothing ● Three-sigma rule Advanced ● Robust Anomaly Detection (RAD) - Netflix ● Kolmogorov-Smirnov ● Highest density interval (HDI) ● t-digest ● Linear models
  • 18. Techniques Basic ● Static thresholds - Doesn’t play well with nonstationary signals. ● Exponential Smoothing - Black Swan days like Christmas, Superbowl cause issues. ● Three-sigma rule - Works (very) well only for signals drawn from a Gaussian.
  • 19. Show me the Money! ● No threshold configuration ● We require examples of normal, not examples of anomaly ● Automatically adapt to moving signals ● Higher accuracy enables automatic reaction ● Ensemble (combination) of techniques eliminates some downsides
  • 20. Base Rate Fallacy Intrusion is comparatively rare which affords you many opportunities to generate a false positive.
  • 21. Base Rate Fallacy ● 10,000 log entries ● 99% Accuracy ● 0.01% Intrusions 1 Real incident 100 false + and 10% chance of false -
  • 22. Case Study So far we can automatically alert interested parties to the possibility of an intrusion.
  • 23. Identifying Rogue Agents in a Production Environment Outlier Detection
  • 25. Rogue Agents? ● Identify brute force attempts on login systems ● Flag cheaters in online video games ● Identify participating ip addresses in a phishing scam
  • 27. Case Study Revisited You’ve devised an automated technique for identifying attacks, now we require an autonomous system for remediation of attacks.
  • 28. Goal: identify accounts and IP Addresses that are not behaving like their peers.
  • 29. Clustering ● DBSCAN ● K-Means ● Gaussian Mixture Models Conceptually ● If a point belongs to a group it should be near lots of other points as measured by some distance function.
  • 31. Case Study Revisited Lets cluster accounts based on their login habits and initiate an automatic password reset and notification.
  • 32. Case Study Revisited Lets cluster IP addresses based on their login habits and automatically ban them.
  • 33. Full stack autonomous incident detection and remediation. Recap
  • 34. Case Study Recap ● Anomaly Detection enables us to... ○ Automatically identify potential attacks in real-time. ○ Notify interested parties of the attack. ○ React to those attacks without user intervention. ● Outlier Detection with Clustering enables us to… ○ Identify rogue agents within the environment. ○ Reset customer passwords for potentially compromised accounts. ○ Ban IP Addresses identified to be participating in the phishing scheme.
  • 35. Literature Machine Learning: The High Interest Credit Card of Technical Debt (Sculley et al., 2014)
  • 36. Literature ● The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection (Alexsson, 1999) ● Practical Machine Learning: A New Look at Anomaly Detection (Dunning, 2014) ● ALADIN: Active Learning of Anomalies to Detect Intrusion (Stokes and Platt, 2008) ● Distinguishing cause from effect using observational data: methods and benchmarks (Mooij et al., 2014) ● Enhancing Performance Prediction Robustness by Combining Analytical Modeling and Machine Learning (Didona et al., 2015)
  • 37. Implementations ● Robust Anomaly Detection (RAD) - Netflix ● Seasonal Hybrid ESD - Twitter ● Extendible Generic Anomaly Detection System (EGADS) - Yahoo ● Kale - Etsy