filmov
tv
Practical Threat Hunting With Machine Learning

Показать описание
Machine learning technologies often have a high barrier to entry and require expertise from different disciplines - data science, data engineering, software engineering, security research, and security operations - that are not always readily available. One person, from any of these individual disciplines, may not possess the requisite knowledge to operationalize machine learning models for threat hunting. We developed our 64 machine learning jobs (unsupervised models) for threat hunting by pairing a security researcher with data scientists and data engineers and we found this combination yielded the best results. I will describe our development methodology. The resulting 64 jobs have a sufficiently simple operational model that security analysts can deploy and tune them without requiring a data scientist. With tuning requirements similar to conventional rules, a security or SOC team can consume the output of the models as alerts in order to hunt interesting threats that search-based rules will often not find.
As threat actors continue to innovate in order to evade detection, ML techniques can be very useful in finding the few malicious events that may be hidden among billions of similar events with only a difference in nuance. While not a replacement for human analysis, the size, and gravity of modern logging and event data sets make ML a valuable addition to conventional search rules and hunting techniques.
Case studies will include high-value detections including C2 detection using frequency and shape analysis of network events; DGA detection using frequency and shape analysis of DNS events; privilege elevation and exfiltration in cloud environments using frequency analysis of both single fields and pairs of field values; credentialed access relevant to ransomware scenarios using frequency analysis; and LPE exploit activity using frequency analysis and computation of relative rarity. Finally, work on risk-based detection clustering will be demonstrated. Clustering often produces high-confidence correlations, making actionable detections easier to see.
#ThreatHuntingSummit #MachineLearning
As threat actors continue to innovate in order to evade detection, ML techniques can be very useful in finding the few malicious events that may be hidden among billions of similar events with only a difference in nuance. While not a replacement for human analysis, the size, and gravity of modern logging and event data sets make ML a valuable addition to conventional search rules and hunting techniques.
Case studies will include high-value detections including C2 detection using frequency and shape analysis of network events; DGA detection using frequency and shape analysis of DNS events; privilege elevation and exfiltration in cloud environments using frequency analysis of both single fields and pairs of field values; credentialed access relevant to ransomware scenarios using frequency analysis; and LPE exploit activity using frequency analysis and computation of relative rarity. Finally, work on risk-based detection clustering will be demonstrated. Clustering often produces high-confidence correlations, making actionable detections easier to see.
#ThreatHuntingSummit #MachineLearning
Комментарии