ISOLATION FOREST

THREAT HUNTING THROUGH THE USE OF AN ISOLATION FOREST

This post was originally published here by Christopher McCubbin. In a recent Boston Bsides talk, David Bianco and I briefly mentioned the use of isolation forests to find unusual behavior in cybersecurity log files. Today, we will take a deeper dive into the techniques that we experimented with. These experiments were run in collaboration with Dimitar Karev, […]

Share this page