Applying Machine Learning to User Behavior Anomaly Analysis

Applying Machine Learning to User Behavior Anomaly Analysis

Hack In The Box Security Conference via YouTube Direct link

DATA FORMATS

6 of 29

6 of 29

DATA FORMATS

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Applying Machine Learning to User Behavior Anomaly Analysis

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 OUTLINE
  3. 3 USER BEHAVIOR ANALYTICS
  4. 4 MACHINE LEARNING
  5. 5 DATA SOURCES
  6. 6 DATA FORMATS
  7. 7 DATA NORMALIZATION: BEFORE
  8. 8 DATA NORMALIZATION: AFTER
  9. 9 ERP SECURITY LOGGING
  10. 10 THREAT MODEL Use Cases
  11. 11 ANOMALY TYPES
  12. 12 ANOMALIES VS. THREATS
  13. 13 STATIC ANOMALY DETECTION
  14. 14 CONTEXT BUILDING
  15. 15 CONTEXT THRESHOLD
  16. 16 CONTEXT MATCHING
  17. 17 ANOMALY ANALYSIS
  18. 18 TEMPORAL ANOMALY DETECTION
  19. 19 FEATURE ENGINEERING
  20. 20 FEATURE SELECTION
  21. 21 FEATURE ENCODING
  22. 22 MODEL IMPLEMENTATION
  23. 23 MODEL MEMORY
  24. 24 MODEL DESIGN Architecture
  25. 25 MODEL PARAMETERS
  26. 26 SEQUENCE LENGTH
  27. 27 KNOWLEDGE BASE SORTING
  28. 28 ADAPTIVE THRESHOLD
  29. 29 CONCLUSIONS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.