DS21 - 223 - Florian Skopik, Markus Wurzenberger and Max Landauer - Do Not Get Hacked Get AMiner from anomaly meaning in audit Watch Video
Preview(s):
Gallery
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)
⏲ Duration: 28 min 71 sec ✓ Published: 03-Dec-2021
Description: Monitoring log data for traces of malicious activities has proven to be an effective method for incident detection in cyber security. State-of-the-art detectors thereby frequently apply signature-based detection, meaning that these tools search for specific strings or tokens from threat intelligence databases that are known to correspond to particular attacks.nnUnfortunately, signature-based detection is vulnerable to already simple forms of evasion techniques, and certainly insufficient to disc
Play Video: (Note: The default playback of the video is HD VERSION. If your browser is buffering the video slowly, please play the REGULAR MP4 VERSION or Open The Video below for better experience. Thank you!)