Death to the IOC - What's Next in Threat Intelligence
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the future of threat intelligence in cybersecurity through this 26-minute Black Hat conference talk. Delve into the automation of entity extraction using machine learning techniques specific to the cybersecurity domain. Learn how to leverage ML for custom entity extraction from unstructured text, generate valuable insights, and identify patterns of attacks faced by enterprises. Discover the potential of advanced techniques like word embeddings, conditional random fields, and LSDM for improving threat intelligence capabilities. Gain insights into the challenges of unseen tokens and explore open questions in the field. Access the full abstract and presentation materials for a comprehensive understanding of this cutting-edge approach to cybersecurity threat intelligence.
Syllabus
Introduction
About Padma
Training Data
IOB Style
Word Embedding
Word Embedding Example
Word Embedding Visualization
Conditional Random Fields
LSDM
Recall
Precision
Unseen Tokens
Whats Next
Open Questions
Taught by
Black Hat
Related Courses
Sequence ModelsDeepLearning.AI via Coursera Natural Language Processing in TensorFlow
DeepLearning.AI via Coursera Applied Natural Language Processing
Chennai Mathematical Institute via Swayam Natural Language Processing
IBM via Udacity Natural Language Processing with Classification and Vector Spaces
DeepLearning.AI via Coursera