Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Zero Trust Explained: Why Traditional

    July 16, 2025

    Running high-performance PostgreSQL on Azure Kubernetes Service

    July 16, 2025

    Now Microsoft’s Copilot Vision AI can scan everything on your screen

    July 16, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Anomaly detection betrayed us, so we gave it a new job – Sophos News
    IT/ Cybersecurity

    Anomaly detection betrayed us, so we gave it a new job – Sophos News

    big tee tech hubBy big tee tech hubJuly 15, 2025002 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Anomaly detection betrayed us, so we gave it a new job – Sophos News
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    At this year’s Black Hat USA conference, Sophos Senior Data Scientists Ben Gelman and Sean Bergeron will give a talk on their research into command line anomaly detection – examining how large language models (LLMs) and classical anomaly detection can be synergistically combined to identify critical data for augmenting dedicated command line classifiers.

    Anomaly detection in cybersecurity has long promised the ability to identify threats by highlighting deviations from expected behavior. For classifying malicious command lines, however, its practical application often results in high false positive rates, making it expensive and inefficient. But that’s not the whole story when it comes to command line anomaly detection; recent innovations in AI provide a new angle for researchers to explore.

    In their talk, Ben and Sean will explore this topic by developing a pipeline that does not depend on anomaly detection as a point of failure. Using anomaly detection to feed a different process avoids the potentially catastrophic false positive rates of an unsupervised method. Instead, Ben and Sean created improvements in a supervised model targeted towards classification.

    Unexpectedly, the success of their method did not depend on anomaly detection locating malicious command lines. They gained a valuable insight: anomaly detection, when paired with LLM-based labeling, yields a remarkably diverse set of benign command lines. Leveraging this benign data when training command line classifiers significantly reduces false positive rates. Furthermore, it allows researchers and defenders to use plentiful existing data without the needles in a haystack that are malicious command lines in production data.

    Ben and Sean will share the results of their research, and the methodology of their experiment, highlighting how diverse benign data identified through anomaly detection broadens the classifier’s understanding and contributes to creating a more resilient detection system. By shifting focus from solely aiming to find malicious anomalies to harnessing benign diversity, they developed a potential paradigm shift in command line classification strategies – something that can be implemented in detection systems at a large scale and low cost.

    Ben and Sean will present their talk at the Black Hat USA conference in Las Vegas, Nevada on Thursday 7 August at 1.30pm PDT. A more detailed article on their research will be published following the presentation.



    Source link

    Anomaly betrayed Detection gave job News Sophos
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Zero Trust Explained: Why Traditional

    July 16, 2025

    Twilio’s Event Triggered Journeys, OutSystem’s Agent Workbench, and more – Daily News Digest

    July 16, 2025

    Elmo has been hacked, claims Trump is in Epstein files, calls for Jews to be exterminated • Graham Cluley

    July 15, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Zero Trust Explained: Why Traditional

    July 16, 2025

    Running high-performance PostgreSQL on Azure Kubernetes Service

    July 16, 2025

    Now Microsoft’s Copilot Vision AI can scan everything on your screen

    July 16, 2025

    Technical Approaches and Practical Tradeoffs

    July 16, 2025
    Advertisement
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Zero Trust Explained: Why Traditional

    July 16, 2025

    Running high-performance PostgreSQL on Azure Kubernetes Service

    July 16, 2025

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2025 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.