Sept. 25, 2023, 5:58 p.m. | Black Hat

Black Hat www.youtube.com

In this presentation, we will discuss how to leverage streaming-based outlier detection and SliceLine to quickly and safely generate large volumes of rules/signatures that can be used to block malicious traffic.

While ML use has become more and more widespread, rules are still relevant. Indeed, companies have invested a lot in efficient rule engines capable of quickly evaluating a significant volume of rules. Moreover, rules are often more convenient to create, manipulate and interpret, making them still valuable in addition …

attacks block bot bot attacks companies detection discuss distributed indeed large malicious presentation quickly relevant rules signatures streaming traffic

QA Customer Response Engineer

@ ORBCOMM | Sterling, VA Office, Sterling, VA, US

Enterprise Security Architect

@ Booz Allen Hamilton | USA, TX, San Antonio (3133 General Hudnell Dr) Client Site

DoD SkillBridge - Systems Security Engineer (Active Duty Military Only)

@ Sierra Nevada Corporation | Dayton, OH - OH OD1

Senior Development Security Analyst (REMOTE)

@ Oracle | United States

Software Engineer - Network Security

@ Cloudflare, Inc. | Remote

Software Engineer, Cryptography Services

@ Robinhood | Toronto, ON