Acing the IOC Game - Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore cutting-edge research on automatic discovery and analysis of open-source cyber threat intelligence in this conference talk from CCS 2016. Delve into the innovative approach presented by researchers from Georgia Institute of Technology and Indiana University Bloomington for acing the Indicators of Compromise (IOC) game. Learn about the components of their system, including the blog scraper, preprocessor, relevant content picker, dependency parser, and IOC generator. Examine the evaluation results, comparisons with existing methods, and the impact on security. Gain insights into correlation analysis and decay time analysis of cyber threat intelligence. Understand how this research contributes to enhancing cybersecurity through automated threat intelligence gathering and analysis.
Syllabus
Introduction
Example
Overview
Blog Scraper
Blog Preprocessor
Relevant Content Picker
Dependency parser
Direct product kernel
IOC generator
Evaluation
Results
Comparison
Summary
Correlation Analysis
Decay Time Analysis
Impact on Security
Conclusion
Taught by
ACM CCS
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube