impostor detection - distinguishing hackers misrepresenting identity from genuine users
TRANSCRIPT
Trusted Messaging through Impostor Detection
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
Finalist
About me – Gagan Prakash
• Founder & CEO of Astra IDentity, Inc.
• MassChallenge Finalist 2014
• MIT Sloan Fellows MBA 2011
• Co-Founded Collaboration Online in 2002
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
Anomaly Detection
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• “Anomaly detection is the identification of events which do not conform to an expected pattern” – Wikipedia
• Increasingly done by security companies
• IBM’s Technology Trend Prediction - Digital Guardian -
• “It looks at behavior… and spots something anomalous. It screams when there is something out of the norm.”
• Cloud Computing
• Big Data
• Machine Learning
Anomaly Detection - GreenSQL
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Database Security Solution
• Preventing SQL injection attacks
• Spotting anomalies in database queries
Anomaly Detection – Rough Steps
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Establish objectives
• Get sample data
• Extract features
• Develop model
• Test model
• Use, Iterate & refine model
Resources
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Big Data• AWS DynamoDB• Google BigQuery• MongoDB, Hadoop, HBase
• Machine Learning• Mahout• Python – sci-kit
• Cloud Computing• Amazon AWS• Google, Microsoft Azure, Rackspace, IBM Softlayer
• Other sites/tools• www.kdnuggets.com• www.lingpipe.com• Meetups Predictive Analytics/ Machine Learning/ PyData• Coursera Andrew Ng
Anomaly Detection Challenges
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• False Positives
• False Negatives
• Access to Data/ Training Time
• Building & revising models
• Knowledge of Applied Statistics AND software
• Keeping up with Machine Learning/Data Science
Impostor Detection
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Easy to spoof individuals
• Triangulate behavior and compare to historical to detect impostors
• Examples
Pindrop Security – Impostor Detection for phone calls
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
“Pindrop solutions identify fraudsters based on anomalies in their calls, allowing us to detect spoofing, forwarding, suspicious call origins, and other indications of fraud.”
Guardian Analytics – Impostor Detection for Login forms
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
“Utilizing the industry’s most advanced behavior-based anomaly detection technology, FraudMAP Access delivers sophisticated fraud prevention capabilities with easy-to-use investigation and forensics tools.”
CyberArk - Impostor Detection for Network Usage
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
“Learns the behavior of the privileged users and accounts. Privileged Threat Analytics compares real-time privileged account activity to historical behavior in order to detect anomalies as they occur.”
AstraID - PhishingGuardian – Impostor Detection for Email
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
“Hackers phish using identities of known contacts & brands AstraID's Impostor Detection creates behavioral fingerprints and stops these imposters.”
Impostor Detection - Summary
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Impostor Detection & Anomaly Detection are fast growing tools
• Additional vector for determining bad actors
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
Questions