Submit Search
Upload
Talkj4mshare
•
Download as PPT, PDF
•
0 likes
•
725 views
Tiago Henriques
Follow
Report
Share
Report
Share
1 of 49
Download now
Recommended
In this talk we will present some techniques that we use on a day to day basis in our research, where we combine our internet-wide data scanning and acquisition platform with ML/Data science techniques which allows us to find things faster or extract results in a more automated way. We will focus on practical cases and examples that even our audience at home will be able to use if they want. A couple of examples we will look at is how to classify images such as VNC screenshots, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. We will start by giving a very brief entry to the data science world and talk about: Technologies Techniques How these relate to infosec Algorithms and how they can be used How people can come into the world of data and machine learning Data visualization techniques and what are the best choices for different types of data A couple of examples we will look at is how to classify images such as VNC or x11 screenshots, OCR, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will look at scoring and classification algorithms and how they can be used on ip addresses and we will talk about the use of learning and how we are applying it in real life. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. Some specific examples of our research that should give you an idea of some things we will talk about can be seen here: https://blog.binaryedge.io/2015/11/10/ssh/ https://blog.binaryedge.io/2015/09/30/vnc-image-analysis-and-data-science/ https://blog.binaryedge.io/2015/08/10/data-technologies-and-security-part-1/
BSides Lisbon - Data science, machine learning and cybersecurity
BSides Lisbon - Data science, machine learning and cybersecurity
Tiago Henriques
On this talk BinaryEdge looked at the state of the main Websites of Switzerland, we also looked at the 3 pillars that it stands on banking, insurance and pharma and how they looked from an external perspective.
Webzurich - The State of Web Security in Switzerland
Webzurich - The State of Web Security in Switzerland
Tiago Henriques
Codebits 2010
Codebits 2010
Tiago Henriques
Slides from Bsides Lisbon 2023 about practical use cases for AI in cybersecurity - this presentation attempts to build the knowledge of cybersecurity professionals in the world of AI and present a set of tools and techniques they can use on their day to day.
BSides Lisbon 2023 - AI in Cybersecurity.pdf
BSides Lisbon 2023 - AI in Cybersecurity.pdf
Tiago Henriques
We live in a Data-centric era. Nowadays we have at our disposal an enormous variety of services using data. Behind those services there are architectures supporting the flowing and processing of that data. BinaryEdge.io is no exception. Supporting our platform, we have a data architecture processing 1000s of events per second, which was built and is currently maintained by us. In this talk we are going to review the parts that compose a data architecture, and discuss which tools can be used at each step to arrive at a functional architecture. Note that the insights given will not be based of theoretical documents or truckloads of years of experience, but on our own experience of building and maintaining a large scale data infrastructure and architecture
Pixels Camp 2017 - Stories from the trenches of building a data architecture
Pixels Camp 2017 - Stories from the trenches of building a data architecture
Tiago Henriques
Much like Eleven and the gang, we at BinaryEdge sometimes are confronted with real monsters. Unlike in the series "Stranger Things" however, the monsters we're faced with take different shapes. Our monsters are usually found in the shape of weird things people connect to the internet. Often we're asked "What is the craziest things you guys have found connected to the internet?" In this talk we intend to answer and show exactly that. If you've seen our previous talks and/or read our "World Security Report" for 2016 (ise.binaryedge.io) you know that we have found some of the weirdest things online. From water dams, to electricity grids, and nuclear laboratory sensors, people simply love connecting things to the internet. And in this talk, we are going to explore the top "things" we've found exposed, talk about the different protocols they use and also allow YOU live on talk to search for your own things! On this talk we will also release our 2017 report, where we show how we detected some of the NSA tools such as Double pulsar. We will also make an interesting reveal on this topic. :)
Pixels Camp 2017 - Stranger Things the internet version
Pixels Camp 2017 - Stranger Things the internet version
Tiago Henriques
In this presentation we make a quick overview of the exposure of companies in Switzerland to cyber attacks.
The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017
Tiago Henriques
Talk given at Pixels Camp 2016 about combining Machine Learning and CyberSecurity
I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACH...
I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACH...
Tiago Henriques
Recommended
In this talk we will present some techniques that we use on a day to day basis in our research, where we combine our internet-wide data scanning and acquisition platform with ML/Data science techniques which allows us to find things faster or extract results in a more automated way. We will focus on practical cases and examples that even our audience at home will be able to use if they want. A couple of examples we will look at is how to classify images such as VNC screenshots, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. We will start by giving a very brief entry to the data science world and talk about: Technologies Techniques How these relate to infosec Algorithms and how they can be used How people can come into the world of data and machine learning Data visualization techniques and what are the best choices for different types of data A couple of examples we will look at is how to classify images such as VNC or x11 screenshots, OCR, we will look at network scans and using machine learning to classify them and also the use of natural language processing to analyze CVEs. We will look at scoring and classification algorithms and how they can be used on ip addresses and we will talk about the use of learning and how we are applying it in real life. We will also talk a bit about a data analysis and classification pipeline architecture, we will look at the different technologies and what they do and how they can be used. Some specific examples of our research that should give you an idea of some things we will talk about can be seen here: https://blog.binaryedge.io/2015/11/10/ssh/ https://blog.binaryedge.io/2015/09/30/vnc-image-analysis-and-data-science/ https://blog.binaryedge.io/2015/08/10/data-technologies-and-security-part-1/
BSides Lisbon - Data science, machine learning and cybersecurity
BSides Lisbon - Data science, machine learning and cybersecurity
Tiago Henriques
On this talk BinaryEdge looked at the state of the main Websites of Switzerland, we also looked at the 3 pillars that it stands on banking, insurance and pharma and how they looked from an external perspective.
Webzurich - The State of Web Security in Switzerland
Webzurich - The State of Web Security in Switzerland
Tiago Henriques
Codebits 2010
Codebits 2010
Tiago Henriques
Slides from Bsides Lisbon 2023 about practical use cases for AI in cybersecurity - this presentation attempts to build the knowledge of cybersecurity professionals in the world of AI and present a set of tools and techniques they can use on their day to day.
BSides Lisbon 2023 - AI in Cybersecurity.pdf
BSides Lisbon 2023 - AI in Cybersecurity.pdf
Tiago Henriques
We live in a Data-centric era. Nowadays we have at our disposal an enormous variety of services using data. Behind those services there are architectures supporting the flowing and processing of that data. BinaryEdge.io is no exception. Supporting our platform, we have a data architecture processing 1000s of events per second, which was built and is currently maintained by us. In this talk we are going to review the parts that compose a data architecture, and discuss which tools can be used at each step to arrive at a functional architecture. Note that the insights given will not be based of theoretical documents or truckloads of years of experience, but on our own experience of building and maintaining a large scale data infrastructure and architecture
Pixels Camp 2017 - Stories from the trenches of building a data architecture
Pixels Camp 2017 - Stories from the trenches of building a data architecture
Tiago Henriques
Much like Eleven and the gang, we at BinaryEdge sometimes are confronted with real monsters. Unlike in the series "Stranger Things" however, the monsters we're faced with take different shapes. Our monsters are usually found in the shape of weird things people connect to the internet. Often we're asked "What is the craziest things you guys have found connected to the internet?" In this talk we intend to answer and show exactly that. If you've seen our previous talks and/or read our "World Security Report" for 2016 (ise.binaryedge.io) you know that we have found some of the weirdest things online. From water dams, to electricity grids, and nuclear laboratory sensors, people simply love connecting things to the internet. And in this talk, we are going to explore the top "things" we've found exposed, talk about the different protocols they use and also allow YOU live on talk to search for your own things! On this talk we will also release our 2017 report, where we show how we detected some of the NSA tools such as Double pulsar. We will also make an interesting reveal on this topic. :)
Pixels Camp 2017 - Stranger Things the internet version
Pixels Camp 2017 - Stranger Things the internet version
Tiago Henriques
In this presentation we make a quick overview of the exposure of companies in Switzerland to cyber attacks.
The state of cybersecurity in Switzerland - FinTechDay 2017
The state of cybersecurity in Switzerland - FinTechDay 2017
Tiago Henriques
Talk given at Pixels Camp 2016 about combining Machine Learning and CyberSecurity
I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACH...
I FOR ONE WELCOME OUR NEW CYBER OVERLORDS! AN INTRODUCTION TO THE USE OF MACH...
Tiago Henriques
In this presentation we talk about the research we are doing combining Machine learning techniques with Cybersecurity data.
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
Tiago Henriques
Codebits 2014 - Secure Coding - Gamification and automation for the win
Codebits 2014 - Secure Coding - Gamification and automation for the win
Tiago Henriques
Presentation Brucon - Anubisnetworks and PTCoresec
Presentation Brucon - Anubisnetworks and PTCoresec
Tiago Henriques
Presentation done at confraria
Hardware hacking 101
Hardware hacking 101
Tiago Henriques
Workshop
Workshop
Tiago Henriques
Enei
Enei
Tiago Henriques
Confraria 28-feb-2013 mesa redonda
Confraria 28-feb-2013 mesa redonda
Tiago Henriques
Preso fcul
Preso fcul
Tiago Henriques
How to dominate a country
How to dominate a country
Tiago Henriques
How to own a country
Country domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havoc
Tiago Henriques
Bruno Morisson e Herman Duarte (http://pt.linkedin.com/in/morisson /http://pt.linkedin.com/in/hcoduarte) Título: (ab)using SSH - Tips & Tricks for Pentesters and Sysadmins
(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh
Tiago Henriques
Secure coding - Balgan - Tiago Henriques
Secure coding - Balgan - Tiago Henriques
Tiago Henriques
My Talk @ Confraria February 2012
Vulnerability, exploit to metasploit
Vulnerability, exploit to metasploit
Tiago Henriques
Just4meeting 2011 - Practical exploitation and cyberstalking!
Practical exploitation and social engineering
Practical exploitation and social engineering
Tiago Henriques
Booklet
Booklet
Tiago Henriques
More Related Content
More from Tiago Henriques
In this presentation we talk about the research we are doing combining Machine learning techniques with Cybersecurity data.
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
Tiago Henriques
Codebits 2014 - Secure Coding - Gamification and automation for the win
Codebits 2014 - Secure Coding - Gamification and automation for the win
Tiago Henriques
Presentation Brucon - Anubisnetworks and PTCoresec
Presentation Brucon - Anubisnetworks and PTCoresec
Tiago Henriques
Presentation done at confraria
Hardware hacking 101
Hardware hacking 101
Tiago Henriques
Workshop
Workshop
Tiago Henriques
Enei
Enei
Tiago Henriques
Confraria 28-feb-2013 mesa redonda
Confraria 28-feb-2013 mesa redonda
Tiago Henriques
Preso fcul
Preso fcul
Tiago Henriques
How to dominate a country
How to dominate a country
Tiago Henriques
How to own a country
Country domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havoc
Tiago Henriques
Bruno Morisson e Herman Duarte (http://pt.linkedin.com/in/morisson /http://pt.linkedin.com/in/hcoduarte) Título: (ab)using SSH - Tips & Tricks for Pentesters and Sysadmins
(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh
Tiago Henriques
Secure coding - Balgan - Tiago Henriques
Secure coding - Balgan - Tiago Henriques
Tiago Henriques
My Talk @ Confraria February 2012
Vulnerability, exploit to metasploit
Vulnerability, exploit to metasploit
Tiago Henriques
Just4meeting 2011 - Practical exploitation and cyberstalking!
Practical exploitation and social engineering
Practical exploitation and social engineering
Tiago Henriques
Booklet
Booklet
Tiago Henriques
More from Tiago Henriques
(15)
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
BinaryEdge - Security Data Metrics and Measurements at Scale - BSidesLisbon 2015
Codebits 2014 - Secure Coding - Gamification and automation for the win
Codebits 2014 - Secure Coding - Gamification and automation for the win
Presentation Brucon - Anubisnetworks and PTCoresec
Presentation Brucon - Anubisnetworks and PTCoresec
Hardware hacking 101
Hardware hacking 101
Workshop
Workshop
Enei
Enei
Confraria 28-feb-2013 mesa redonda
Confraria 28-feb-2013 mesa redonda
Preso fcul
Preso fcul
How to dominate a country
How to dominate a country
Country domination - Causing chaos and wrecking havoc
Country domination - Causing chaos and wrecking havoc
(Mis)trusting and (ab)using ssh
(Mis)trusting and (ab)using ssh
Secure coding - Balgan - Tiago Henriques
Secure coding - Balgan - Tiago Henriques
Vulnerability, exploit to metasploit
Vulnerability, exploit to metasploit
Practical exploitation and social engineering
Practical exploitation and social engineering
Booklet
Booklet
Download now