We are pleased to release a new Data Science White Paper, focused on our approach to Anomaly Detection. This paper, which is available upon request, picks up where our October 2015 Data Science White Paper left off, describing in detail our approach and the use cases we support.
The paper starts with a motivating example, describing the traces a sophisticated attacker leaves behind and how the traces can be detected. We then describe our algorithms within the context of the example and provide other use cases covered by our approach. We finish with a summary of the strategic advantages of the platform.
Read this paper to learn more about:
The paper starts with a motivating example, describing the traces a sophisticated attacker leaves behind and how the traces can be detected. We then describe our algorithms within the context of the example and provide other use cases covered by our approach. We finish with a summary of the strategic advantages of the platform.
Read this paper to learn more about:
- Our unsupervised anomaly detection approach, including detection of rare events, spikes, and out of context events.
- Entity level alert roll-ups, which help users prioritize investigations.
- The specific security use cases we address, which we map to the Lockheed cyber kill chain.
- The key advantages of our approach and algorithms.