YoVDO

Graph-Charged Cybersecurity Intelligence

Offered By: Oracle via YouTube

Tags

Oracle CloudWorld Courses Machine Learning Courses Anomaly Detection Courses Cloud Security Courses Threat Detection Courses

Course Description

Overview

Explore graph-powered cybersecurity intelligence in this 23-minute conference talk from CloudWorld 2022. Dive into Oracle's threat detection pipeline, designed to build a real-time, smarter, and deeper cybersecurity intelligence system with interpretable results. Learn about the battle between cloud security providers and sophisticated malicious attackers, and discover how graph technology is revolutionizing threat detection. Gain insights into anomaly sessions, log data processing, and the use of graph search and virtual nodes. Understand the challenges of trusting machine learning models and the importance of interactive interpretation capabilities for threat investigators. Discover how Oracle's approach enables visual and interactive explanations from machine learning models, empowering security professionals to determine appropriate actions in response to evolving threats.

Syllabus

Introduction
Overview
Context
Goals
Pipeline
Anomaly sessions
Logs
Data
Decrease Data
Results
Precision
Graphs
Graph Search
Virtual Nodes
What do we get
What to do
Trust the model
Graph Neural Network Explainer
Graph Neural Network Investigation
Challenges
Contact us


Taught by

Oracle

Tags

Related Courses

Model Building and Validation
AT&T via Udacity
Поиск структуры в данных
Moscow Institute of Physics and Technology via Coursera
Data Analytics Foundations for Accountancy II
University of Illinois at Urbana-Champaign via Coursera
Developing Machine Learning Applications
Amazon via Independent
Anomaly Detection in Time Series Data with Keras
Coursera Project Network via Coursera