impostor detection - distinguishing hackers misrepresenting identity from genuine users
TRANSCRIPT
![Page 1: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/1.jpg)
Trusted Messaging through Impostor Detection
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
Finalist
![Page 2: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/2.jpg)
About me – Gagan Prakash
• Founder & CEO of Astra IDentity, Inc.
• MassChallenge Finalist 2014
• MIT Sloan Fellows MBA 2011
• Co-Founded Collaboration Online in 2002
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
![Page 3: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/3.jpg)
Anomaly Detection
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• “Anomaly detection is the identification of events which do not conform to an expected pattern” – Wikipedia
• Increasingly done by security companies
• IBM’s Technology Trend Prediction - Digital Guardian -
• “It looks at behavior… and spots something anomalous. It screams when there is something out of the norm.”
• Cloud Computing
• Big Data
• Machine Learning
![Page 4: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/4.jpg)
Anomaly Detection - GreenSQL
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Database Security Solution
• Preventing SQL injection attacks
• Spotting anomalies in database queries
![Page 5: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/5.jpg)
Anomaly Detection – Rough Steps
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Establish objectives
• Get sample data
• Extract features
• Develop model
• Test model
• Use, Iterate & refine model
![Page 6: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/6.jpg)
Resources
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Big Data• AWS DynamoDB• Google BigQuery• MongoDB, Hadoop, HBase
• Machine Learning• Mahout• Python – sci-kit
• Cloud Computing• Amazon AWS• Google, Microsoft Azure, Rackspace, IBM Softlayer
• Other sites/tools• www.kdnuggets.com• www.lingpipe.com• Meetups Predictive Analytics/ Machine Learning/ PyData• Coursera Andrew Ng
![Page 7: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/7.jpg)
Anomaly Detection Challenges
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• False Positives
• False Negatives
• Access to Data/ Training Time
• Building & revising models
• Knowledge of Applied Statistics AND software
• Keeping up with Machine Learning/Data Science
![Page 8: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/8.jpg)
Impostor Detection
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Easy to spoof individuals
• Triangulate behavior and compare to historical to detect impostors
• Examples
![Page 9: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/9.jpg)
Pindrop Security – Impostor Detection for phone calls
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
“Pindrop solutions identify fraudsters based on anomalies in their calls, allowing us to detect spoofing, forwarding, suspicious call origins, and other indications of fraud.”
![Page 10: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/10.jpg)
Guardian Analytics – Impostor Detection for Login forms
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
“Utilizing the industry’s most advanced behavior-based anomaly detection technology, FraudMAP Access delivers sophisticated fraud prevention capabilities with easy-to-use investigation and forensics tools.”
![Page 11: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/11.jpg)
CyberArk - Impostor Detection for Network Usage
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
“Learns the behavior of the privileged users and accounts. Privileged Threat Analytics compares real-time privileged account activity to historical behavior in order to detect anomalies as they occur.”
![Page 12: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/12.jpg)
AstraID - PhishingGuardian – Impostor Detection for Email
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
“Hackers phish using identities of known contacts & brands AstraID's Impostor Detection creates behavioral fingerprints and stops these imposters.”
![Page 13: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/13.jpg)
Impostor Detection - Summary
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
• Impostor Detection & Anomaly Detection are fast growing tools
• Additional vector for determining bad actors
![Page 14: Impostor Detection - Distinguishing hackers misrepresenting identity from genuine users](https://reader034.vdocuments.us/reader034/viewer/2022052700/55a1a3d21a28abc43f8b46c1/html5/thumbnails/14.jpg)
© Astra IDentity, Inc. – www.astraid.com – Gagan Prakash – 844-744-7448 – [email protected]
Questions