Finding Bad Guys Using Math and Statistics

Using enrichment to turn low-value events into high-value events. Enrichment techniques are geoip, tld extraction, length, and entropy. I then demonstrate how to find anomalous stuff like: drive-by malware / malicious web browsing Command and Control (C2) Communications DNS tunneling Data Exfiltration

Jared McQueen

Principal Systems Engineer, McQueen Solutions

Jared is a Systems Engineer and Data Scientist supporting Federal customers within the IC and DOD. His team deploys large-scale Elastic clusters to support mission needs in the fields of Cyber Security, Enterprise Audit, and devOps. His experience in Machine Learning and neural networks plays a pivotal role in identifying anomalous activity and outliers within large datasets. Other interests include quantitative finance (algotrading) and Artificial Intelligence.