Overview
Syllabus
Introduction
Who are we
Phishing
Ransomware
Normal Hunting
Common Networks
Network Size
Big Data
Machine Learning
Combining
Challenges
Muller Dynamic
Metadata
Other Changes
Basic Features
Flowbased
Bagbased
Examples
Action Recognition
Overview
Multiple Instance Learning Approach
HTML paper
Training Data
Positive Unlabeled Training
Random Product
Neural Networks
Classification Topology
Active Learning
Classification Module
Summary
Mark the relatives
Thread analyse
N stranger
Audience Changer
Source Source
Mamba
In summary
Advertising gone rogue
Traffic in the network
Second opinion
Popnet
Mapping the infrastructure
Host names
The finish
The algorithm
More campaigns
Conclusions
What got us here
Questions
Future of security
Taught by
Black Hat