Using ML models to detect and stop authorization bypass vulnerabilities | Juan Berner | NULLCON

preview_player
Показать описание
Talk: Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities

Abstract:
One of the most common vulnerabilities that can be found in web applications is authorization bypass vulnerabilities. These vulnerabilities exploit a lack of authorization controls or bugs in them which would allow unauthorized parties to access user’s data. While many solutions attempt to detect when a possible attack might be happening, alert fatigue can affect teams trying to detect these types of attacks allowing real attacks to go unnoticed. This talk will focus on how we can leverage open-source machine learning tools and techniques to detect when those attempts are successful and blocking them before the user’s data can be compromised.

About Juan Berner:

He has given talks in the past on how to build an open-source SIEM, exploiting A/B Testing frameworks (Exploiting A/B Testing for Fun and Profit) or building open source WAF architectures that do not incur on latency or false positives.

-----------------------------------------------------
#Nullcon2020 #MachineLearning #Security
-----------------------------------------------------
Рекомендации по теме
join shbcf.ru