FloCon 2019 Presentations
• Collection
Publisher
Software Engineering Institute
Topic or Tag
Abstract
This collection of presentations were given at FloCon 2019, an annual event where attendees discuss the analysis of large volumes of traffic and showcase the next generation of flow-based analysis techniques.
Collection Items
![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Improved Hunt Seeding with Specific Anomaly Scoring
• Presentation
By Brenden Bishop (Columbus Collaboratory)
In this presentation, the attendees were presented with a flexible, open-source tool for non-parametrically modeling multivariate densities of network logs.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Using Triangulation to Evaluate Machine Learning Models
• Presentation
By Andrew Fast, PhD (CounterFlow AI)
In this presentation, Dr. Andrew Fast presents a series of questions and data queries that can be used to determine the parameters of effectiveness for a machine learning model.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Cybersecurity Data Science: Best Practices from the Field
• Presentation
By Scott Mongeau (SAS)
In this presentation, the author seeks to take a step back from methodological insights and case studies to ask larger questions concerning the status of cybersecurity data science as an …
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Four Machine Learning Techniques that Tackle Scale - And Not Just By Increasing Accuracy
• Presentation
By Lindsey Lack (Gigamon Applied Threat Research (ATR)
In this presentation the author presents an overview of the ways in which recent machine learning techniques can provide ancillary value—value beyond accurate predictions—that helps with the problems of scaling …
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
The Power of Cyber Threat Intelligence
• Presentation
By Eboni Thamavong (X8, Full Spectrum Engagement)
In this presentation, the author discusses how to anticipate the right questions and convey the right information to executives through case studies that highlight the power of what cyber threat …
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
The Generation and Use of TLS Fingerprints
• Presentation
By Blake Anderson (Cisco Systems, Inc.), David McGrew (Cisco Systems, Inc.), Keith Schomburg (Cisco Systems, Inc.)
In this presentation, the authors describe a TLS fingerprinting system and discusses the common pitfalls when using this type of information and analyzes techniques that make effective use of our …
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Monitoring Massive Network Traffic using Bayesian Inference
• Presentation
By David Rodriguez (Cisco Systems, Inc.)
In this presentation, the author discusses methods for performing large scale Bayesian inference on DNS logs aggregated into count data, representing the number of requests from tens of millions of …
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Using Generative Adversarial Networks to Improve Phishing Domain Classifiers
• Presentation
By Jen Burns (The MITRE Corporation), Emily Heath (Mitre)
In this presentation, the authors discuss the use of generative adversarial networks (GANs) to construct synthetic phishing domains as potential evasion attacks, and test the value of including these domains …
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Harvesting Logs for Enhanced Investigations
• Presentation
By David Gainey (Defense Information Systems Agency)
In this talk, the author discusses the type of information that should be continuously collected and kept on-hand for investigative value in the case of a network compromise, and he …
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Network Telescopes Revisited: From Loads of Unwanted Traffic to Threat Intelligence
• Presentation
By Piotr Bazydlo (Research and Academic Computer Network (NASK, Poland)), Adrian Korczak (Research and Academic Computer Network (NASK, Poland), Pawel Pawlinski (Research and Academic Computer Network (NASK, Poland))
This presentation introduces a comprehensive system developed to analyze malicious traffic on a large scale and produce actionable results in close to real time.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Time-Based Correlation of Malicious Events and Their Connections
• Presentation
By Steve Henderson, Brittany Nicholls (Enlighten IT Consulting), Brian Ehmann (Enlighten IT Consulting)
In this presentation, the authors discuss how to automate the use of statistics to help link events and connections in a timeline during an incident or forensic investigation.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
IMPACT: Information Marketplace for Policy and Analysis of Cyber-risk & Trust
• Presentation
By Jeff Schmidt (Columbus Collaboratory)
In this presentation, Jeff Schmidt introduces a U.S. Department of Homeland Security (DHS) program called Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT).
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
InSight2: IRNC Advanced Measurements and Instrumentation (AMI)
• Presentation
By Angel Kodituwakku (The University of Tennessee Knoxville), Dr. Jens Gregor (The University of Tennessee Knoxville), Buseung Cho (KISTI), Carter Bullard (QuSient LLC)
In this presentation, the authors discuss InSight2, an open platform, intended to monitor and facilitate the development of network analytics for these large-scale networks.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Detecting Automatic Flows
• Presentation
By Jeffrey Dean (United States Air Force)
In this presentation, Jeffrey Dean, PhD., discusses specific Netflow-derived features that can be used to discriminate between flows generated by user actions and those generated automatically by applications or systems.
Learn More![presentation-thumbnail-1](/media/images/Presentation_Thumbnail_1.max-150x150.format-webp.webp)
Quantum Approach to Inverse Malware Eradication
• Presentation
By Daniel Medina (Glasswall Solutions Inc.), Matt Shabat (Glasswall Solutions Inc.)
The goal of this presentation is to inform people that using a 'pass only known good' methodology through a quantum approach simplifies the solution, and the future of information security …
Learn More