YoVDO

Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control Systems

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses Model Evaluation Courses Industrial Control Systems Courses

Course Description

Overview

Explore a 26-minute Black Hat conference talk on Graph Convolutional Network-based suspicious communication pair estimation for industrial control systems. Delve into the effectiveness of whitelisting as a security monitoring method for industrial control system networks, focusing on communication triplets. Learn about the DCN and GCN scopes, abnormality scoring, key ideas, and the RGCN process. Examine the evaluation phase, experimental results, discrimination performance, and computational costs associated with this approach to network security monitoring.

Syllabus

Introduction
Background
DCN Scope
Abnormality Score
Key Ideas
GCN Scope Overview
GCN Scope Process
RGCN
Scoring Phase
Evaluation
Experimental Results
Discrimination Performance
Performance
Computational Cost


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube