YoVDO

PEIMA - Harnessing Power Laws to Detect Malicious Activities

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Internet of Things Courses Cybersecurity Courses Firewalls Courses Intrusion Detection Systems Courses Denial-of-Service Attacks Courses

Course Description

Overview

Explore a groundbreaking approach to detecting malicious network activities in this 25-minute Black Hat conference talk. Delve into the PEIMA (Power-law Exponent Inspection for Malicious Activity) method, which harnesses power laws to identify and mitigate various cyber threats, including Distributed Denial of Service (DDoS) attacks, intrusion attempts, and abnormal traffic patterns. Learn how this innovative technique can be applied to combat the rising challenges posed by IoT devices and sophisticated attack vectors. Gain insights into the practical implementation of PEIMA, understanding its foundations in power laws, Pareto distribution, and Zipf's law. Discover real-world applications, from detecting DoS attacks to identifying altered processes, and equip yourself with a powerful tool to enhance network security and anomaly detection capabilities.

Syllabus

Introduction
Denial of Service attacks
Internet of Things
What can we do
Firewall
Intrusion Detection System
Anomaly Based Detection
What is PEIMA
Power Laws
Pareto Distribution
Zips Law
Why is this interesting
DoS attacks
March of the Red crabs
Anomaly detection
Detecting altered processes
How to use PEIMA
Example
Conclusion
Questions


Taught by

Black Hat

Related Courses

Web Science: How the Web Is Changing the World
University of Southampton via FutureLearn
Develop Java Embedded Applications Using a Raspberry Pi
Oracle via Independent
Introducción a Raspberry Pi (Ver-2)
Galileo University via Independent
Fog Networks and the Internet of Things
Princeton University via Coursera
Digital Media and Marketing Principles
University of Illinois at Urbana-Champaign via Coursera