Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control Systems
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a 26-minute Black Hat conference talk on Graph Convolutional Network-based suspicious communication pair estimation for industrial control systems. Delve into the effectiveness of whitelisting as a security monitoring method for industrial control system networks, focusing on communication triplets. Learn about the DCN and GCN scopes, abnormality scoring, key ideas, and the RGCN process. Examine the evaluation phase, experimental results, discrimination performance, and computational costs associated with this approach to network security monitoring.
Syllabus
Introduction
Background
DCN Scope
Abnormality Score
Key Ideas
GCN Scope Overview
GCN Scope Process
RGCN
Scoring Phase
Evaluation
Experimental Results
Discrimination Performance
Performance
Computational Cost
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network