SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIt is all too often modern day security analysts are plagued with security events that are irrelevant to a targeted host. Current applications and technologies attempt to eliminate these events by means of manually disabling and altering IPS/IDS rulesets. While this technology works, it does not provide an automated process for distinguishing the higher priority events from the low/irrelevant security risks. This paper is aimed at describing how to create a simple, static inventory database, then comparing security alerts to see if they relate to the host in question. This will allow for greater visibility into which alerts are actually relevant to the end users network.