![]() This team applied machine learning to security data to help analysts make decisions about whether their networks are facing actual incidents. They say they will release tools with these techniques incorporated.Īpplied Machine Learning for Data Exfil and Other Fun Topicsīrian Wallace, Senior Security Researcher, Cylance, Matt Wolff, Chief Data Scientist, Cylance, and Xuan Zhao, Data Scientist, Cylance “This talk briefly introduces QUIC and HTTP/2, covers multiplexing attacks beyond MPTCP, discusses how you can use these techniques over QUIC and within HTTP/2, and discusses how to make sense of and defend against H2/QUIC traffic on your network ,” according to the description of their talk. Back then they discovered that because MPTCP changed paths and endpoints during sessions, it was difficult to secure the traffic and possible to compromise it. The researchers say they are experiencing déjà vu because they have found security weaknesses in these protocols that are reminiscent of weaknesses they found two years ago in multipath TCP (MPTCP). These two researchers took a look at HTTP/2 and QUIC, two Web protocols used to multiplex connections. Security Consultant, Cisco, and Catherine (Kate) Pearce, Sr. HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things ![]() ![]() Here is a sampling of some of the scheduled educational briefings coming up next week along with a description of the free tools that will accompany them. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |