Posted on
in Presentations
Malicious activities inside enterprise networks often use stolen credentials. For example, an attacker may authenticate to an enterprise’s services using stolen credentials during lateral movement. Speakers cast the detection of such authentication events as a classification problem and demonstrate our machine learning-based approach’s scalability and reliability on a Los Alamos National Labs data set.
Learning Objectives:
1: Learn that reliable near-time detection of stolen credentials is feasible.
2: See why data processing, feature engineering and parameter tuning are crucial.
3: Understand scalability requires continuous analytics, model building and online detection.
Learning Objectives:
1: Learn that reliable near-time detection of stolen credentials is feasible.
2: See why data processing, feature engineering and parameter tuning are crucial.
3: Understand scalability requires continuous analytics, model building and online detection.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community