Presented by:
Thomas . (GCHQ)
When:
Tuesday, March 16, 2021 - 11:45 to 12:10
Venue:
INI Seminar Room 1
Abstract:
In cybersecurity we want to detect malicious activity by finding unusual patterns of behaviour. The logs of events on a system can be modelled as trees that evolve over time; the path signature provides a way to extract features from these trees by considering them as a collection of paths. We can then use these features in machine learning techniques, to distinguish different types of behaviour.
Presentation material: