From Bits to Behavior - Detecting macOS Command and Control Through Statistical Analysis
Objective-See Foundation via YouTube
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Build GenAI Apps from Scratch — UCSB PaCE Certificate Program
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn to detect macOS command and control (C2) communication through statistical analysis in this conference talk that reveals how malicious activity leaves detectable traces in system logs. Explore common C2 tactics used by attackers and discover statistical techniques for identifying suspicious patterns such as consistent callbacks and irregular timing variations (jitter). Master practical implementation methods using OSQuery and Filebeat for effective log collection and analysis. Gain insights into how statistical shadows can expose stealthy malicious communications that traditional detection methods might miss. Understand the methodology for transforming raw log data into actionable security intelligence through data science approaches applied to macOS security monitoring.
Syllabus
OBTS v8 “From Bits to Behavior: Detecting macOS Com & Con Through Statistical Analysis” A Knottnerus
Taught by
Objective-See Foundation