Submissions
Detecting anomalous network patterns

Detecting anomalous network patterns

Using anomaly patterns for improved data security, network monitoring and observability.

Tickets

Loading…

Accepting submissions till 06 Dec 2021, 11:30 PM

Not accepting submissions

Topics for speaking: Application of anamalous network patterns or anomaly data for detecting data breaches. Application of anamalous network patterns or anomaly detection data to do capacity planning for data security. expand

Topics for speaking:

  1. Application of anamalous network patterns or anomaly data for detecting data breaches.
  2. Application of anamalous network patterns or anomaly detection data to do capacity planning for data security.
  3. Tools and workflows your organization uses to monitor networks - in payments, gaming, CDNs, and other domains.
  4. Application of anomaly detection for cybersecurity.

We invite network security engineers, cybersecurity practitioners, and systems engineers to speak/contribute content.

Content can be submitted in the form of:

  1. 15 minute talks
  2. 30 minute talks
  3. 1,000 word written articles

All content will be peer-reviewed by practitioners from industry.

Make a submission

Accepting submissions till 06 Dec 2021, 11:30 PM

Swapneel Patnekar

Swapneel Patnekar

Packets don't lie - Network Security Monitoring (NSM) for the masses

Prevention ultimately fails. With this uncomfortable premise, everyone gets breached. The circumstances for networks become grave when one looks at defending networks from the security 1% lens. According to Richard Bejtlich, more
  • 4 comments
  • Confirmed & scheduled
  • 24 May 2021
Rashid Feroz

Rashid Feroz

Achieving a High Level of Network Inspection with VPC Traffic Mirroring and Suricata

COVID has hit everyone and affected people in their own way. As far as organizations are concerned, employees have been asked to work from home (WFH), and because many industries are now working remotely, the pattern of user connections to the enterprise network has turned upside down. Instead of most users connecting locally, now most are connecting remotely. And for allowing employees to access… more
  • 8 comments
  • Confirmed & scheduled
  • 24 May 2021

Yael Goldstein

Where is my traffic going? And other tough questions of hybrid network monitoring

Modern application architectures have evolved networking beyond physical connections. IP addresses are no longer sufficient descriptors of components like virtual machines, containers, and cloud services. Effectively managing complex, distributed environments requires an understanding of how these components interact, which cannot be obtained with traditional network monitoring tools. more
  • 3 comments
  • Confirmed & scheduled
  • 25 May 2021

Boris Taratine

Knowledge vs. Faith: How to Use Observable Data to Make Better Defence Decisions

Over the past years we increasingly relied on someone’s else judgement and opinion of what is bad or good on the Internet. And whilst very often the things changed the scores may not, leading to false positives or complicated and obscure risk-score structures. Also, to form an opinion, one need to observe the behaviour for some time to cast judgement. What can we do in the meantime? Knowledge abo… more
  • 3 comments
  • Confirmed & scheduled
  • 28 May 2021
Jithesh Kaveetil

Jithesh Kaveetil

Advanced Anomaly Detection Systems for Transactions and Network flows

India holds the record for having the highest number of digital transactions annually. VuNet is a major Indian player in this, helping several prominent banks through AI driven monitoring of their payment transaction flows and network infrastructure to improve the user experience. Through our flagship product, vuSmartMaps, we have been rigorously analysing millions of transactions, applications, … more
  • 4 comments
  • Confirmed & scheduled
  • 31 May 2021
Vipin Chaudhary

Vipin Chaudhary

What is happening in my network? Network egress observability at Dream11.

One of the many challenges a SRE/Devops/Cloud Security Officer has to face in his or her job is to know at any time what is going on in the cloud egress network. They must perform continuous analyses and checks to determine which cloud systems communicate which each other , which cloud system are sending data outside and which protocols are they employed. What about the data that is transferred t… more
  • 5 comments
  • Confirmed & scheduled
  • 28 May 2021

Dishant Shah

API Security powered by Deep Learning

Spherical Defense is working on applying research from Cambridge University on representation learning and Natural Language Processing (NLP) to web application / API security. We learn the baseline in an unsupervised manner of normal JSON request headers and payloads, and can detect anomalies. We learn continuously as the application changes and reduce false positives. We can 1) detect anomalies … more
  • 10 comments
  • Confirmed & scheduled
  • 18 May 2021

Ravindra Ved

Anatomy of an attack

Network behaviour analysis often leads to early indicators of attack, however, network behaviour needs to be augmented with additional data points like user behaviour, data flow characteristics, threat intelligence, anonymous API calls to identify and establish threat patterns more
  • 4 comments
  • Confirmed & scheduled
  • 25 May 2021

Shrutirupa Banerjiee

Magecart - The Rising Threat to e-commerce Websites

The news about a cyber attack in a big enterprise is not new. We keep on hearing about such attacks and how millions of data are being stolen or leaked. Thus, Data breaches are one common impact of cyber attacks in any large organization. Attackers keep on looking for newer exploits or rare kinds of attacks to steal user information and use them for malicious use. In this session, the audience wi… more
  • 5 comments
  • Waitlisted
  • 25 May 2021

Anwesha Sen

Checklist for Network Security Monitoring (NSM) for On-premise, Data Centers and Cloud set-ups

This checklist was developed from the Birds of Feather (BOF) session on Tooling for NSM held on 15 June 2021 under the Anomalous Network Detection Patterns programme. Swapneel Patnekar - Founder at Sreshta IT - and Rashid Feroz - Security Engineer at CRED - shared their experiences and learnings. Anand Venkatnarayan, cybersecurity expert and editor of Privacy Mode and Rootconf progammes moderated… more
  • 0 comments
  • Submitted
  • 30 May 2022
Hybrid access (members only)

Hosted by

We care about site reliability, cloud costs, security and data privacy

Supported by

Omidyar Network India invests in bold entrepreneurs who help create a meaningful life for every Indian, especially the hundreds of millions of Indians in low-income and lower-middle-income populations, ranging from the poorest among us to the existing middle class. To drive empowerment and social i… more
We’re the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. As a hyperscale cloud service provider, AWS provides access to highly advanced computing tools on rent for startups and SMEs at affordable prices. We help t… more
The FreeBSD Foundation is a 501(c)(3), US based, non-profit organization dedicated to supporting and promoting the FreeBSD Project and community worldwide. Funding comes from individual and corporate donations and is used to fund and manage projects, fund conferences and developer summits, and prov… more

Promoted

Deep dives into privacy and security, and understanding needs of the Indian tech ecosystem through guides, research, collaboration, events and conferences. Sponsors: Privacy Mode’s programmes are sponsored by: more