What is it about?
In the article, we show that by combining data from separate traditional detection systems (such as network layer detection, SIEM, the output of threat hunts, Endpoint Detection and Response) and training a model on the basis of red team attacks and confirmed incidents, a scalable and high-quality detection for a Security Operations Centre (SOC) can be achieved. This methodology significantly outperforms the traditional, stove-piped way of working of SOCs, including so-called User Behaviour Apps (UBA or UEBA apps). The alerts and some other information are ingested into an AI-powered integration layer where the features of the detection models are calculated and models are run. The feedback loop is shown in the infographic.
Featured Image
Photo by Markus Spiske on Unsplash
Why is it important?
Detection of cyber attacks to the earliest point in time is critical to prevent further damage and impact on an organisation with digital infrastructure
Perspectives
Read the Original
This page is a summary of: Finding Harmony in the Noise: Blending Security Alerts for Attack Detection, April 2024, ACM (Association for Computing Machinery),
DOI: 10.1145/3605098.3635981.
You can read the full text:
Contributors
The following have contributed to this page