ISOLATION FOREST

THREAT HUNTING THROUGH THE USE OF AN ISOLATION FOREST

This post was originally published here by Christopher McCubbin. In a recent Boston Bsides talk,¬†David Bianco¬†and I briefly mentioned the use of isolation forests to find unusual behavior in cybersecurity log files. Today, we will take a deeper dive into the techniques that we experimented with. These experiments were run in collaboration with Dimitar Karev, […]

Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!