YoVDO

PEIMA - Harnessing Power Laws to Detect Malicious Activities

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Internet of Things Courses Cybersecurity Courses Firewalls Courses Intrusion Detection Systems Courses Denial-of-Service Attacks Courses

Course Description

Overview

Explore a groundbreaking approach to detecting malicious network activities in this 25-minute Black Hat conference talk. Delve into the PEIMA (Power-law Exponent Inspection for Malicious Activity) method, which harnesses power laws to identify and mitigate various cyber threats, including Distributed Denial of Service (DDoS) attacks, intrusion attempts, and abnormal traffic patterns. Learn how this innovative technique can be applied to combat the rising challenges posed by IoT devices and sophisticated attack vectors. Gain insights into the practical implementation of PEIMA, understanding its foundations in power laws, Pareto distribution, and Zipf's law. Discover real-world applications, from detecting DoS attacks to identifying altered processes, and equip yourself with a powerful tool to enhance network security and anomaly detection capabilities.

Syllabus

Introduction
Denial of Service attacks
Internet of Things
What can we do
Firewall
Intrusion Detection System
Anomaly Based Detection
What is PEIMA
Power Laws
Pareto Distribution
Zips Law
Why is this interesting
DoS attacks
March of the Red crabs
Anomaly detection
Detecting altered processes
How to use PEIMA
Example
Conclusion
Questions


Taught by

Black Hat

Related Courses

Detecting and Mitigating Cyber Threats and Attacks
University of Colorado System via Coursera
Secure Networked System with Firewall and IDS
University of Colorado System via Coursera
Networking in Google Cloud: Fundamentals
Google Cloud via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Introduction to Cybersecurity Tools & Cyberattacks
IBM via Coursera