| description |
<b>Machine Learning vs Cryptocoin Miners </b>
<b>Description:</b>
With the advent of cryptocurrencies as a prevalent economic entity, attackers have begun turning compromised boxes and environments into cash via cryptocoin mining. This has given rise for the opportunity to detect compromised environments by analyzing network traffic logs for evidence of cryptocoin miners. Specifically, I'll be reviewing various ML and statistical analysis techniques leveraged against VPC Flow Logs. This talk will not be a deep dive of the math involved but instead a general discussion of these techniques and why I chose them.
<p><b>Speaker's Bio:</b>
John Callahan is a principal appsec consultant at nVisium. John has spoken probably a good dozen times at the OWASP DC and NOVA chapters before. He has been working in appsec for half a decade now, initially within the DoD and now commercially with many high-visibility companies. Recently John has been digging into ML to find some ways to bridge it and the security industry in an intelligent and usable fashion.
</p>
|
→ |
<b>Machine Learning vs Cryptocoin Miners </b>
<b>Description:</b>
With the advent of cryptocurrencies as a prevalent economic entity, attackers have begun turning compromised boxes and environments into cash via cryptocoin mining. This has given rise for the opportunity to detect compromised environments by analyzing network traffic logs for evidence of cryptocoin miners. Specifically, I'll be reviewing various ML and statistical analysis techniques leveraged against VPC Flow Logs. This talk will not be a deep dive of the math involved but instead a general discussion of these techniques and why I chose them.
<p><b>Speaker's Bio:</b>
Jonn Callahan is a principal appsec consultant at nVisium. Jonn was previously heavily involved in the OWASP DC and NoVA chapters. He has been working in appsec for half a decade now, initially within the DoD and now commercially with many high-visibility companies. Recently, Jonn has been digging into ML to find ways to bridge it and the security industry in an intelligent and usable fashion.
</p>
|