Democratize Anomaly Detection Technologies: Challenges, Advances, and Opportunities

Source: Shutterstock, https://www.shutterstock.com/image-illustration/abstract-bright-glitter-blue-background-elegant-513694585
Source: Shutterstock, https://www.shutterstock.com/image-illustration/abstract-bright-glitter-blue-background-elegant-513694585

Presented: May 16, 2017 11:00 am (ET)
Presented by: Danfeng (Daphne) Yao

The mature signature-based intrusion detection technology has been the first line of defense in the cyberspace. However, due to the perpetual cat-and-mouse game and asymmetry natures of cybersecurity, high-risk assets susceptible to advanced persistent threats need to be equipped with proactive defense mechanisms, beyond the conventional reactive signature-based scanning. A more sophisticated cyber-defense technique is program anomaly detection, which builds models to represent properties of normal executions of programs and detect behavior deviations during execution. The advantage of anomaly detection techniques is their potential to detect new attacks. However, existing demonstrations are limited to lab environments. Multiple challenges need to be addressed, before such tools can be widely deployed in production systems.

This webinar highlights recent success in demonstrating substantial improvements in the accuracy under control-flow and data-oriented attacks in Linux, including malicious code reuse, security bypass, and service abuse. The webinar also describes exciting future research directions on hardware-assisted fast tracing, anomaly-detection as a service, supporting domain experts for inter-disciplinary anomaly discovery, and standardizing evaluation.

Computer Icon

Host a Webinar with CSIAC

Are you interested in delivering a webinar presentation on your DoD research and engineering efforts?

Want to find out more about this topic?

Request a FREE Technical Inquiry!