From Bits to Behavior - Detecting macOS Command and Control Through Statistical Analysis
Objective-See Foundation via YouTube
Launch Your Cybersecurity Career in 6 Months
AI Product Expert Certification - Master Generative AI Skills
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to detect macOS command and control (C2) communication through statistical analysis in this conference talk that reveals how malicious activity leaves detectable traces in system logs. Explore common C2 tactics used by attackers and discover statistical techniques for identifying suspicious patterns such as consistent callbacks and irregular timing variations (jitter). Master practical implementation methods using OSQuery and Filebeat for effective log collection and analysis. Gain insights into how statistical shadows can expose stealthy malicious communications that traditional detection methods might miss. Understand the methodology for transforming raw log data into actionable security intelligence through data science approaches applied to macOS security monitoring.
Syllabus
OBTS v8 “From Bits to Behavior: Detecting macOS Com & Con Through Statistical Analysis” A Knottnerus
Taught by
Objective-See Foundation