Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Application Intrusion Detection
Search
Kim Carter
July 03, 2021
Technology
0
520
Application Intrusion Detection
Kim Carter
July 03, 2021
Tweet
Share
More Decks by Kim Carter
See All by Kim Carter
owaspnz-chch-meetup-2021-workshop-planning-and-covid
binarymist
0
570
Security Regression Testing on OWASP Zap Node API
binarymist
1
10k
Building purpleteam (a Security Regression Testing SaaS) - From PoC to Alpha
binarymist
0
1.4k
OWASP Quiz Night
binarymist
2
1.3k
The Art of Exploitation
binarymist
2
1.2k
Developing a High Performance Security Focussed Agile Team (2 hr workshop)
binarymist
1
810
OWASP NZ Day 2016
binarymist
0
200
Infectious Media with Rubber Ducky
binarymist
1
600
0wn1ng The Web at www.wdcnz.com
binarymist
2
1.9k
Other Decks in Technology
See All in Technology
持続可能な開発のためのミニマリズム
sansantech
PRO
3
430
AWS監視を「もっと楽する」ために
uechishingo
0
200
CQRS/ESになぜアクターモデルが必要なのか
j5ik2o
0
1.3k
The Engineer with a Three-Year Cycle
e99h2121
0
160
Models vs Bounded Contexts for Domain Modularizati...
ewolff
0
210
人はいかにして 確率的な挙動を 受け入れていくのか
vaaaaanquish
0
110
なぜCREを8年間続けているのか / cre-camp-4-2026-01-21
missasan
0
960
Hardware/Software Co-design: Motivations and reflections with respect to security
bcantrill
1
220
Eight Engineering Unit 紹介資料
sansan33
PRO
0
6.3k
kintone開発のプラットフォームエンジニアの紹介
cybozuinsideout
PRO
0
560
Agentic Coding 実践ワークショップ
watany
13
9.4k
新規事業 toitta におけるAI 機能評価の話 / AI Feature Evaluation in toitta
pokutuna
0
120
Featured
See All Featured
Designing Experiences People Love
moore
143
24k
We Are The Robots
honzajavorek
0
140
The Invisible Side of Design
smashingmag
302
51k
Practical Orchestrator
shlominoach
191
11k
Building a Scalable Design System with Sketch
lauravandoore
463
34k
A designer walks into a library…
pauljervisheath
210
24k
How to Think Like a Performance Engineer
csswizardry
28
2.4k
Navigating Algorithm Shifts & AI Overviews - #SMXNext
aleyda
0
1.1k
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
333
22k
The #1 spot is gone: here's how to win anyway
tamaranovitovic
2
890
Neural Spatial Audio Processing for Sound Field Analysis and Control
skoyamalab
0
150
Efficient Content Optimization with Google Search Console & Apps Script
katarinadahlin
PRO
0
290
Transcript
COMMUNITY TOPICS Welcome InfoSecNZ Slack, OWASP Slack Anything else people
want to mention? Tonights talk (Chris - Incident Response), (Me - Application Intrusion Detection)
APPLICATION INTRUSION DETECTION
HIDS, NIDS, AIDS?
1. Asset Identification 2. Identify Risks 3. Countermeasures 4. Risks
that Solution Causes 5. Costs and Trade-offs
1. SSM Asset Identification
2. SSM Identify Risks
Lack of Visibility Insufficient Logging (->) & Monitoring (<-) Covered
in for OWASP Top 10 Insufficient Attack Protection Book -> Holistic Info-Sec for Web Developers No. 10 Lack of Active Automated Prevention
3. SSM Countermeasures
Lack of Visibility ... Detection works where prevention fails and
detection is of no use without response Bruce Schneier
Lack of Visibility OWASP Top 10 - Insufficient Logging Insufficient
Monitoring A10 Kim's book
WAF App Intrusion Detection & Response Active Automated Prevention Insufficient
Attack Protection
App Intrusion Detection->Prevention is reactive
By being proactive -> SAST, DAST
It's been 8 years now in alpha and releases being
published regularly purpleteam It's time to let someone else take over Pete Nicholls is taking over from me Next Meetup Last Wed of Sep - Pete & Toni - Ask anything panel