SlideShare a Scribd company logo
Detecting Threats with
Analytics and Machine
Learning (ML)
Shomiron DAS GUPTA (GCIA)
Founder, CEO
NETMONASTERY Inc.
#SACON
Agenda
■ Dissecting detection systems
■ Why do we need “analytics”
■ Learning systems
■ Anomaly / Heuristics / Dictionaries
■ Machine Learning Use Cases
■ Why ML works / fails
#SACON
Dissecting Detection Systems
■ Signature based
■ Anomaly engines
■ Analytics workbench
■ Learning systems
#SACON
Why do we need “Analytics”
The Real Need for Analytics
■ Cyber security refresh rate
■ Custom payloads from attackers
■ Servers not the target
■ Speed with volume
#SACON
Learning Systems
■ Heuristic learning
■ Anomaly engines
■ Spot / Baseline / Profilers
■ Time series analytics
■ Classifiers
■ Unassisted learning
#SACON
Heuristics
■ Virus detection, OS Rootkits
v1 v2 v3 v4
Day 14Day 6Day 1 Day 42
#SACON
Anomaly
■ DDoS Detection, Protocol Obfuscation, Malformed
Data Streams, Application Breach
Fixed Anomaly
Model Structure
Could be traffic behavior,
protocol behavior,
application behavior.
Realtime Data
#SACON
Spot / Baseline / Profilers
■ Unordered Action - new rule, new device, long dead
user, database user event
#SACON
LEARN PHASE EVAL PHASE
Build Model
Transcode model with
feature aggregation
performed on realtime
data flows
Data Data
Evaluation
Identification of
outliers based on
pre approved
model
Time Series Analytics
■ DDoS, Flow Outliers, protocol breach, zombies
#SACON
THRESHOLDING DYNAMIC THRESHOLDING
Fixed limits are set to
detect breach in activity
Moving window analysis of
time series data
Classifiers
■ SPAM, Botnets, Authentication Anomalies
#SACON
Clustering Process
- Suitable feature selection (PCA)
- Training set (static / dynamic)
- Cleaning training data
- Regression to find mean
- Operations
- Feedback and Re-tuning
Unassisted Learning
■ SPAM, DNS Detection, L2 Attacks
#SACON
Alert
Feedback
AnalystSelf Adjusting Loop
Data
Profiler
Model
When is ML working
■ Credible / Clean training data
■ Positive and timely feedback
■ Picking the right features
■ Consistent feature variation
■ Consistent data pattern
#SACON
Where does ML work
■ DNS based detection
■ DDoS / Traffic anomaly
■ SPAM Mail filters
■ Authentication
■ Application modelling
■ Threat Intelligence
#SACON
ML is failing
■ Variance challenge
■ The “stale dataset” problem
■ Mass labelling
■ Complex selection challenges
#SACON
■ Programming in R / Python
■ Data platforms - Splunk, DNIF
■ Infrastructures - Generic Hadoop, Hortonworks
https://dnif.it
Get started with 100Gb free every month forever
Getting Started with ML
#SACON
Shomiron DAS GUPTA
shomiron@netmonastery.com
+91 9820336050
Thank You!
#SACON

More Related Content

PPTX
CyberSecurity Portfolio Management
PDF
OWASP Secure Coding Practices - Quick Reference Guide
PPTX
Secure coding guidelines
PPTX
Threat modelling(system + enterprise)
PPTX
Web Application Penetration Testing Introduction
PPTX
Secure coding practices
PPTX
Application Threat Modeling
PDF
OWASP Top 10 A4 – Insecure Direct Object Reference
CyberSecurity Portfolio Management
OWASP Secure Coding Practices - Quick Reference Guide
Secure coding guidelines
Threat modelling(system + enterprise)
Web Application Penetration Testing Introduction
Secure coding practices
Application Threat Modeling
OWASP Top 10 A4 – Insecure Direct Object Reference

What's hot (20)

PDF
Detection and Response Roles
PPTX
From the Frontline of RASP Adoption
PPT
Application Security
PPTX
Cloud Security vs Security in the Cloud
ODP
OWASP Secure Coding
PDF
Secure Code Review 101
PPT
Web Application Security
PPTX
Security hole #5 application security science or quality assurance
PPT
Mobile application security and threat modeling
PPTX
Secure coding practices
PPTX
DevSecCon Talk: An experiment in agile Threat Modelling
PDF
Application Threat Modeling
PPTX
Security testing
PPTX
Threat modeling the security of the enterprise
PDF
Introduction to Security Testing
PDF
OWASP Top 10 Proactive Control 2016 (C5-C10)
ODP
Introduction to OWASP & Web Application Security
PDF
Securing the Internet from Cyber Criminals
PPT
Penetration Testing Basics
PDF
5 Important Secure Coding Practices
Detection and Response Roles
From the Frontline of RASP Adoption
Application Security
Cloud Security vs Security in the Cloud
OWASP Secure Coding
Secure Code Review 101
Web Application Security
Security hole #5 application security science or quality assurance
Mobile application security and threat modeling
Secure coding practices
DevSecCon Talk: An experiment in agile Threat Modelling
Application Threat Modeling
Security testing
Threat modeling the security of the enterprise
Introduction to Security Testing
OWASP Top 10 Proactive Control 2016 (C5-C10)
Introduction to OWASP & Web Application Security
Securing the Internet from Cyber Criminals
Penetration Testing Basics
5 Important Secure Coding Practices
Ad

Similar to Threat Detection using Analytics & Machine Learning (20)

PDF
SACON17 - Detecting Threats with Analytics and Machine Learning
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PDF
Navy security contest-bigdataforsecurity
PDF
SOC Architecture - Building the NextGen SOC
PDF
AI & ML in Cyber Security - Why Algorithms Are Dangerous
PPTX
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
PPTX
20190123 LSEC CTI - Machine Learning in Infosec
PPTX
BsidesLVPresso2016_JZeditsv6
PPTX
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
PPTX
Delivering Security Insights with Data Analytics and Visualization
PDF
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
PPTX
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
PDF
AI & Machine Learning - Etienne Greeff - SecureData
PPTX
Pushing Machine Learning Down the Security Stack to Make It More Effective fo...
PDF
SACON16 - SOC Architecture
PDF
Network security monitoring elastic webinar - 16 june 2021
PDF
Automated Time Series Analysis using Deep Learning, Ray and Analytics Zoo
PDF
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
PDF
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
PPTX
Machine Learning and Social Good
SACON17 - Detecting Threats with Analytics and Machine Learning
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Navy security contest-bigdataforsecurity
SOC Architecture - Building the NextGen SOC
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
20190123 LSEC CTI - Machine Learning in Infosec
BsidesLVPresso2016_JZeditsv6
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Delivering Security Insights with Data Analytics and Visualization
Autonomous Security: Using Big Data, Machine Learning and AI to Fix Today's S...
Dynamic Population Discovery for Lateral Movement (Using Machine Learning)
AI & Machine Learning - Etienne Greeff - SecureData
Pushing Machine Learning Down the Security Stack to Make It More Effective fo...
SACON16 - SOC Architecture
Network security monitoring elastic webinar - 16 june 2021
Automated Time Series Analysis using Deep Learning, Ray and Analytics Zoo
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
Machine Learning and Social Good
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Machine learning based COVID-19 study performance prediction
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology

Threat Detection using Analytics & Machine Learning

  • 1. Detecting Threats with Analytics and Machine Learning (ML) Shomiron DAS GUPTA (GCIA) Founder, CEO NETMONASTERY Inc. #SACON
  • 2. Agenda ■ Dissecting detection systems ■ Why do we need “analytics” ■ Learning systems ■ Anomaly / Heuristics / Dictionaries ■ Machine Learning Use Cases ■ Why ML works / fails #SACON
  • 3. Dissecting Detection Systems ■ Signature based ■ Anomaly engines ■ Analytics workbench ■ Learning systems #SACON
  • 4. Why do we need “Analytics”
  • 5. The Real Need for Analytics ■ Cyber security refresh rate ■ Custom payloads from attackers ■ Servers not the target ■ Speed with volume #SACON
  • 6. Learning Systems ■ Heuristic learning ■ Anomaly engines ■ Spot / Baseline / Profilers ■ Time series analytics ■ Classifiers ■ Unassisted learning #SACON
  • 7. Heuristics ■ Virus detection, OS Rootkits v1 v2 v3 v4 Day 14Day 6Day 1 Day 42 #SACON
  • 8. Anomaly ■ DDoS Detection, Protocol Obfuscation, Malformed Data Streams, Application Breach Fixed Anomaly Model Structure Could be traffic behavior, protocol behavior, application behavior. Realtime Data #SACON
  • 9. Spot / Baseline / Profilers ■ Unordered Action - new rule, new device, long dead user, database user event #SACON LEARN PHASE EVAL PHASE Build Model Transcode model with feature aggregation performed on realtime data flows Data Data Evaluation Identification of outliers based on pre approved model
  • 10. Time Series Analytics ■ DDoS, Flow Outliers, protocol breach, zombies #SACON THRESHOLDING DYNAMIC THRESHOLDING Fixed limits are set to detect breach in activity Moving window analysis of time series data
  • 11. Classifiers ■ SPAM, Botnets, Authentication Anomalies #SACON Clustering Process - Suitable feature selection (PCA) - Training set (static / dynamic) - Cleaning training data - Regression to find mean - Operations - Feedback and Re-tuning
  • 12. Unassisted Learning ■ SPAM, DNS Detection, L2 Attacks #SACON Alert Feedback AnalystSelf Adjusting Loop Data Profiler Model
  • 13. When is ML working ■ Credible / Clean training data ■ Positive and timely feedback ■ Picking the right features ■ Consistent feature variation ■ Consistent data pattern #SACON
  • 14. Where does ML work ■ DNS based detection ■ DDoS / Traffic anomaly ■ SPAM Mail filters ■ Authentication ■ Application modelling ■ Threat Intelligence #SACON
  • 15. ML is failing ■ Variance challenge ■ The “stale dataset” problem ■ Mass labelling ■ Complex selection challenges #SACON
  • 16. ■ Programming in R / Python ■ Data platforms - Splunk, DNIF ■ Infrastructures - Generic Hadoop, Hortonworks https://dnif.it Get started with 100Gb free every month forever Getting Started with ML #SACON
  • 17. Shomiron DAS GUPTA shomiron@netmonastery.com +91 9820336050 Thank You! #SACON