In order to fully understand the impact of a breach, the detection of malware threats needs to be complemented by the proactive exploration of anomalous network behavior and inter-artifact relationships. This activity is supported by machine learning techniques, which can be leveraged to aggregate and classify events at an unprecedented scale.
Attend this presentation which highlights how machine learning and network anomaly detection can be valuable tools in identifying breaches.
Background
Lastline Enterprise detects the advanced malware in your network that other vendors miss. Lastline has demonstrated 100% accuracy & zero false positives in the most recent NSS Labs' Breach Detection System Group Test. Lastline uses a unique isolation and inspection approach, Deep Content Inspection, to achieve this accuracy. This approach enables it to interact with malware and see everything a piece of malware does-it can't execute a behavior that it can't see. Alternative methods to malware detection like OS emulation and virtualization cannot detect sophisticated evasion techniques, cannot interact with malware, and therefore miss many advanced threats.
Vigna has been researching and developing security technology for more than 20 years, working on malware analysis, web security, vulnerability assessment, and intrusion detection. He is currently a professor in the Department of Computer Science at the University of California in Santa Barbara and is the director of the Computer Security Group at UCSB. He is the author of more than 200 publications, including peer-reviewed papers in journals, conferences, and workshops, a book on intrusion correlation, and (as an editor) a book on mobile code security. Vigna has been the program chair of the International Symposium on Recent Advances in Intrusion Detection (RAID 2003), of the ISOC Symposium on Network and Distributed Systems Security (NDSS 2009), and of the IEEE Symposium on Security and Privacy (in 2010 and 2011). He is known for organizing and running an annual inter-university Capture The Flag (iCTF) hacking contest that involves dozens of institutions and hundreds of students around the world. Vigna also leads the Shellphish Hacking Team, the longest-running team playing at DefCon's CTF.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.