Finding Bad Guys Using Math and Statistics

Using enrichment to turn low-value events into high-value events. Enrichment techniques are geoip, tld extraction, length, and entropy. I then demonstrate how to find anomalous stuff like: drive-by malware / malicious web browsing Command and Control (C2) Communications DNS tunneling Data Exfiltration

Jared McQueen

Principal Systems Engineer, McQueen Solutions

Jared is a systems engineer and data scientist supporting Federal customers within the IC and DOD. His team deploys large-scale Elastic clusters to support mission needs in the fields of cyber security, enterprise audit, and devOps. His experience in machine learning and neural networks plays a pivotal role in identifying anomalous activity and outliers within large datasets. Other interests include immersive 3D data visualizations, quantitative finance (algotrading), and artificial intelligence.