{"id":740044,"date":"2022-03-15T08:31:05","date_gmt":"2022-03-15T15:31:05","guid":{"rendered":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/?post_type=msr-group&#038;p=740044"},"modified":"2023-03-10T10:10:02","modified_gmt":"2023-03-10T18:10:02","slug":"m365-defender-research","status":"publish","type":"msr-group","link":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/group\/m365-defender-research\/","title":{"rendered":"Microsoft 365 Defender\u00a0Research"},"content":{"rendered":"<section class=\"mb-3 moray-highlight\">\n\t<div class=\"card-img-overlay mx-lg-0\">\n\t\t<div class=\"card-background  has-background-grey card-background--full-bleed\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3840\" height=\"1000\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/HERO-PLUS@2x.png\" class=\"attachment-full size-full\" alt=\"Banner Image\" style=\"\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/HERO-PLUS@2x.png 3840w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/HERO-PLUS@2x-300x78.png 300w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/HERO-PLUS@2x-1024x267.png 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/HERO-PLUS@2x-768x200.png 768w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/HERO-PLUS@2x-1536x400.png 1536w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/HERO-PLUS@2x-2048x533.png 2048w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/HERO-PLUS@2x-240x63.png 240w\" sizes=\"auto, (max-width: 3840px) 100vw, 3840px\" \/>\t\t<\/div>\n\t\t<!-- Foreground -->\n\t\t<div class=\"card-foreground d-flex mt-md-n5 my-lg-5 px-g px-lg-0\">\n\t\t\t<!-- Container -->\n\t\t\t<div class=\"container d-flex mt-md-n5 my-lg-5 \">\n\t\t\t\t<!-- Card wrapper -->\n\t\t\t\t<div class=\"w-100 w-lg-col-5\">\n\t\t\t\t\t<!-- Card -->\n\t\t\t\t\t<div class=\"card material-md-card py-5 px-md-5\">\n\t\t\t\t\t\t<div class=\"card-body \">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n<h1 id=\"microsoft-365-defender-security-research-group\" class=\"has-text-align-left h2 is-style-default\" style=\"font-style:normal;font-weight:700;text-transform:capitalize\">Microsoft 365 Defender Security Research Group<\/h1>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n<h2>Machine learning and AI Innovation at Microsoft Security Research<\/h2>\n<p>The cybersecurity landscape has fundamentally changed, as evidenced by diverse, large-scale, and complex attacks in the recent past. Adversaries have grown in volume, velocity and sophistication, and repeatedly disrupted computer systems controlling important pieces of infrastructure. Microsoft is in a unique position in the security space given its scale and coverage of security signals across the entire digital estate. This enables us to track and prevent adversarial activities across the security killchain. This is the foundation upon which we&#8217;re building the teams, tools, analytics, models, and research to responsibly use this data to protect users around the world.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-825391 size-large\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-1024x576.png\" alt=\"M365D-Data-Signals\" width=\"1024\" height=\"576\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-1024x576.png 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-300x169.png 300w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-768x432.png 768w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-1066x600.png 1066w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-655x368.png 655w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-343x193.png 343w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-240x135.png 240w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-640x360.png 640w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal-960x540.png 960w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Images-for-Jugal.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>The Microsoft 365 Defender Research group sits at the core of this. The group leverages applied research, threat intelligence, and security expertise to fuel the technologies behind <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/threat-protection\/microsoft-365-defender\" target=\"_blank\" rel=\"noopener\">Microsoft 365 Defender<\/a>&nbsp;that protects customers globally across endpoints, email&nbsp; and collaboration, identities<u>,<\/u> and cloud apps. The group ideates, experiments, and ships technologies that encompass a variety of research areas including weak supervision, natural language processing, graph representation learning, unsupervised learning, causal inference, Bayesian optimization, privacy preserving machine learning, computer vision, and economic theory. The group\u2019s research can be categorized into the following end applications: Prevention, detection, investigation and remediation, threat intelligence, active and adaptive defense.<\/p>\n<p><strong>Prevention&nbsp;<\/strong>encompasses research to reduce the overall attack surface across user identities, endpoints, cloud apps and user data and to effectively block known and unknown threats. Timely identification and accurate tagging at scale are key to limiting potential attack vectors for an adversary to exploit. The group leverages Microsoft\u2019s unique perspective on enterprise security to predict customers&#8217; residual security risk and to understand its drivers, translating what is often a technical security conversation to the language of business decisions. The group also leverages a plethora of diverse techniques to proactively protect customers against attack in the email, endpoint, cloud, and web spaces.. Emerging privacy preserving machine learning approaches like federated learning, homomorphic encryption, and differential privacy may enable Microsoft to continue providing effective protection without compromising user trust and privacy.<\/p>\n<p><strong>Detection <\/strong>refers to identifying and alerting suspicious behaviors as they happen and responding to them to identify the scale and scope of an attack, thwart the attacker\u2019s entry, and fully remediate any footholds the attacker might have. The key challenge here is to find the right balance between providing enough coverage through security alerts (recall) vs. reducing false alarms (precision). Most organizations that prioritize cybersecurity run a security operations center team 24\/7. Still, there are commonly far more alerts to analyze than analyst cycles to triage them. Alert triage and correlation, incident (group of related alerts) prioritization, and campaign discovery are key areas of research for the group. The group is also exploring ideas to semi-automate this triage process by modeling to predict actions an analyst might take based on previous responses in similar scenarios. <img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-825487 aligncenter\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-1024x576.png\" alt=\"M365-Detection\" width=\"1024\" height=\"576\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-1024x576.png 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-300x169.png 300w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-768x432.png 768w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-1066x600.png 1066w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-655x368.png 655w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-343x193.png 343w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-240x135.png 240w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-640x360.png 640w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3-960x540.png 960w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2021\/04\/Slide3.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><strong>Investigation and remediation<\/strong>&nbsp;assume that a breach has already occurred. The primary goal here is to provide customers with a holistic understanding of a security incident including the extent of the breach, such as which devices and data were impacted, how the propagated&nbsp;through the customer environment, and threat attribution. Gathering this data from telemetry sources is time consuming and tedious. The group is exploring natural language generation to automate the threat report generation process.<\/p>\n<p><strong>Threat intelligence<\/strong>&nbsp;enables security researchers to stay on top of current threat landscape by tracking active malicious actors \u2013 at times deliberately engaging with them and studying their behavior. The group is actively tracking <a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2022\/02\/03\/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends\/\" target=\"_blank\" rel=\"noopener\">40+ active nation-state actors<\/a> and&nbsp;<a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2021\/05\/12\/securing-a-new-world-of-hybrid-work-what-to-know-and-what-to-do\/\" target=\"_blank\" rel=\"noopener\">140+ threat groups representing 20 countries<\/a>. Research challenges include identifying and tagging entities from multiple feeds of unstructured security data, learning high-level relationships and interactions between these entities and mapping them into the ability to identify similarities across different campaigns for better threat attribution. The group has published some work under <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/arxiv.org\/pdf\/2101.07769.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Automated Open-Source Threat Intelligence Gathering and Management<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;and is experimenting to evaluate potential benefits of leveraging large language models in this space.<\/p>\n<p>Security tends to generalize based on past observations, and thus is biased towards what we know about attacks. It is a challenge to build an&nbsp;<strong>active and adaptive defense<\/strong>&nbsp;that can identify and protect from attacks that use new techniques or approaches. The group has done&nbsp;<a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2021\/04\/08\/gamifying-machine-learning-for-stronger-security-and-ai-models\/\" target=\"_blank\" rel=\"noopener\">some initial research<\/a> with the ultimate vision around building autonomous defense systems that learns both offensive and defensive behaviors in an unbiased manner. This technique can be used to uncover novel ways to attacks in a simulated enterprise network and also build defense systems that adapt to these attacks.<\/p>\n<hr>\n<p>The table below highlights some of the research areas being explored for each of the security capabilities, but is in no way a complete representation of all the research within the group.<\/p>\n<table class=\"aligncenter\" style=\"width: 64.5582%;border-collapse: separate;border-spacing: inherit;border-style: solid\" border=\"1\" cellspacing=\"inherit\" cellpadding=\"inherit\">\n<tbody>\n<tr>\n<td style=\"width: 16.4659%;padding: inherit;border: 1px solid;text-align: center\">\n<h4>Capabilities<\/h4>\n<\/td>\n<td style=\"width: 48.0923%;padding: inherit;border: 1px solid;text-align: center\">\n<h4>Research Areas<\/h4>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.4659%;padding: inherit;border: 1px solid;text-align: center\">\n<h4>Prevention<\/h4>\n<\/td>\n<td style=\"width: 48.0923%;padding: inherit;border: 1px solid\">\n<ul>\n<li style=\"text-align: left\">Weak supervision, few shot learning<\/li>\n<li style=\"text-align: left\">Unsupervised learning<\/li>\n<li style=\"text-align: left\">NLP: Language modelling, named entity recognition<\/li>\n<li style=\"text-align: left\">Generative modeling<\/li>\n<li style=\"text-align: left\">Graph methods: spectral embedding, graph matching, graph neural nets, graph representation learning<\/li>\n<li style=\"text-align: left\">Computer vision<\/li>\n<li style=\"text-align: left\">Multimodal<\/li>\n<li style=\"text-align: left\">Bayesian optimization<\/li>\n<li style=\"text-align: left\">Privacy preserving machine learning<\/li>\n<li style=\"text-align: left\">Economic theory, risk quantification<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.4659%;padding: inherit;border: 1px solid;text-align: center\">\n<h4>Detection<\/h4>\n<\/td>\n<td style=\"width: 48.0923%;padding: inherit;border: 1px solid;text-align: left\">\n<ul>\n<li style=\"text-align: left\">Representation learning<\/li>\n<li style=\"text-align: left\">Clustering and correlation&nbsp;<\/li>\n<li>Graph methods: spectral embedding, graph matching, graph neural nets, graph representation learning<\/li>\n<li>Causal inference<\/li>\n<li>Reinforcement learning<\/li>\n<li style=\"text-align: left\">Statistical Modeling<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.4659%;padding: inherit;border: 1px solid;text-align: center\">\n<h4>Investigation and remediation<\/h4>\n<\/td>\n<td style=\"width: 48.0923%;padding: inherit;border: 1px solid;text-align: left\">\n<ul>\n<li>Language modelling, natural language generation<\/li>\n<li>Bayesian statistical modeling<\/li>\n<li>Graph methods: spectral embedding, graph matching, graph neural nets, graph representation learning<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.4659%;padding: inherit;border: 1px solid;text-align: center\">\n<h4>Threat Intelligence<\/h4>\n<\/td>\n<td style=\"width: 48.0923%;padding: inherit;border: 1px solid;text-align: left\">\n<ul>\n<li>NLP: Text summarization, named entity recognition, natural language understanding<\/li>\n<li>Graph methods: spectral embedding, graph matching, graph neural nets, graph representation learning<\/li>\n<li>Language to code generation<\/li>\n<li>Intelligent search and correlation&nbsp;<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 16.4659%;padding: inherit;border: 1px solid;text-align: center\">\n<h4>Active and adaptive defense<\/h4>\n<\/td>\n<td style=\"width: 48.0923%;padding: inherit;border: 1px solid;text-align: left\">\n<ul>\n<li>Reinforcement learning<\/li>\n<li>Contextual bandits<\/li>\n<li>Generative modelling<\/li>\n<li>Graph methods: spectral embedding, graph matching, graph neural nets, graph representation learning<\/li>\n<li>Responsible AI<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<figure class=\"wp-block-table is-style-stripes is-tiny-mce-table\"><\/figure>\n<figure class=\"wp-block-table is-style-stripes is-tiny-mce-table\"><\/figure>\n\n\n\n\n\n<h2 id=\"2022\">2022:<\/h2>\n\n\n\n<h4 id=\"blogs\">Blogs<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2022\/06\/21\/improving-ai-based-defenses-to-disrupt-human-operated-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Improving AI-based defenses to disrupt human-operated ransomware<\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.cylab.cmu.edu\/news\/2022\/05\/11-microsoft.html\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft expands its strategic partnership with CyLab<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/05\/03\/artificial-intelligence-department-of-defense-cyber-missions\/\" target=\"_blank\" rel=\"noopener noreferrer\">Applications for artificial intelligence in Department of Defense cyber missions<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n\n\n\n<h4 id=\"podcasts\">Podcasts<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/55\/notes\">Disinformation in the Enterprise<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 id=\"2021\">2021:<\/h2>\n\n\n\n<h4 id=\"blogs\">Blogs<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2021\/08\/04\/spotting-brand-impersonation-with-swin-transformers-and-siamese-neural-networks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spotting brand impersonation with Swin transformers and Siamese neural networks<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2021\/04\/08\/gamifying-machine-learning-for-stronger-security-and-ai-models\/\" target=\"_blank\" rel=\"noreferrer noopener\">Gamifying machine learning for stronger security and AI models<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2021\/12\/02\/structured-threat-hunting-one-way-microsoft-threat-experts-prioritizes-customer-defense\/\" target=\"_blank\" rel=\"noreferrer noopener\">Structured threat hunting: One way Microsoft Threat Experts prioritizes customer defense<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2021\/06\/18\/microsoft-announces-recipients-of-academic-grants-for-ai-research-on-combating-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft announces recipients of academic grants for AI research on combating phishing<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2021\/04\/01\/automating-threat-actor-tracking-understanding-attacker-behavior-for-intelligence-and-contextual-alerting\/\" target=\"_blank\" rel=\"noreferrer noopener\">Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2021\/07\/27\/combing-through-the-fuzz-using-fuzzy-hashing-and-deep-learning-to-counter-malware-detection-evasion-techniques\/\" target=\"_blank\" rel=\"noreferrer noopener\">Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques<\/a><\/li>\n<\/ul>\n\n\n\n<h4 id=\"podcasts\">Podcasts<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/51\/notes\">When Privacy Meets Security<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/46\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">What the Fuzz?!<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/37\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">Discovering Router Vulnerabilities with Anomaly Detection<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/26\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">Ready or Not, Here A.I. Come!<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/25\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">Knowing Your Enemy: Anticipating Attackers\u2019 Next Moves<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/23\/notes\">Inside Insider Risk<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/18\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">Celebrating Women in Security<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/10\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">Tracking Nation State Actors<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 id=\"2020\">2020:<\/h2>\n\n\n\n<h4 id=\"blogs\">Blogs<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2020\/06\/10\/the-science-behind-microsoft-threat-protection-attack-modeling-for-finding-and-stopping-evasive-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Inside Microsoft 365 Defender: Attack modeling for finding and stopping lateral movement<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2020\/07\/29\/inside-microsoft-threat-protection-solving-cross-domain-security-incidents-through-the-power-of-correlation-analytics\/\" target=\"_blank\" rel=\"noreferrer noopener\">Inside Microsoft 365 Defender: Solving cross-domain security incidents through the power of correlation analytics<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2020\/07\/09\/inside-microsoft-threat-protection-correlating-and-consolidating-attacks-into-incidents\/\" target=\"_blank\" rel=\"noreferrer noopener\">Inside Microsoft 365 Defender: Correlating and consolidating attacks into incidents &#8211; Microsoft Security Blog<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2019\/12\/18\/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data science for cybersecurity: A probabilistic time series model for detecting RDP inbound brute force attacks<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2020\/07\/23\/seeing-the-big-picture-deep-learning-based-fusion-of-behavior-signals-for-threat-detection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Seeing the big picture: Deep learning-based fusion of behavior signals for threat detection<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/security\/blog\/2020\/08\/27\/stopping-active-directory-attacks-and-other-post-exploitation-behavior-with-amsi-and-machine-learning\/\" target=\"_blank\" rel=\"noreferrer noopener\">Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning<\/a><\/li>\n<\/ul>\n\n\n\n<h4 id=\"podcasts\">Podcasts<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/4\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">How to Catch a Villain With Math<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/3\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">Protecting the Under-Secured With Bad Behavior<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/2\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">Unmasking Malicious Scripts With Machine Learning<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/thecyberwire.com\/podcasts\/security-unlocked\/1\/notes\" target=\"_blank\" rel=\"noopener noreferrer\">Going Deep to Find the Unknown Unknowns<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n\n\n<h2 id=\"2021\">2021:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.blackhat.com\/us-21\/briefings\/schedule\/index.html#siamese-neural-networks-for-detecting-brand-impersonation-22669\" target=\"_blank\" rel=\"noopener noreferrer\">Blackhat 2021: Siamese Neural Networks for Detecting Brand Impersonation<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.blackhat.com\/us-21\/sponsored-sessions\/schedule\/index.html#inside-the-boldest-and-most-impactful-nation-state-attack-in-history-25040\" target=\"_blank\" rel=\"noopener noreferrer\">Blackhat 2021: Inside the Boldest and Most Impactful Nation-State Attack in History<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.blackhat.com\/us-21\/sponsored-sessions\/schedule\/#preventing-a-hostage-situation-defusing-the-pervasive-threat-of-human-operated-ransomware-25007\" target=\"_blank\" rel=\"noopener noreferrer\">Blackhat 2021: Preventing a Hostage Situation: Defusing the Pervasive Threat of Human Operated Ransomware<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n\n\n\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/sector.ca\/sessions\/siamese-neural-networks-for-detecting-brand-impersonation\/\" target=\"_blank\" rel=\"noopener noreferrer\">SecTor 2021: Siamese Neural Networks for Detecting Brand Impersonation<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n\n\n\n<h2 id=\"2020\">2020:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.rsaconference.com\/Library\/presentation\/USA\/2020\/ai-security-engineeringmodelingdetectingmitigating-new-vulnerabilities-3\" target=\"_blank\" rel=\"noopener noreferrer\">RSA 2020: AI Security Engineering\u2014Modeling\/Detecting\/Mitigating New Vulnerabilities<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Machine learning and AI Innovation at Microsoft Security Research The cybersecurity landscape has fundamentally changed, as evidenced by diverse, large-scale, and complex attacks in the recent past. Adversaries have grown in volume, velocity and sophistication, and repeatedly disrupted computer systems controlling important pieces of infrastructure. Microsoft is in a unique position in the security space [&hellip;]<\/p>\n","protected":false},"featured_media":825358,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_group_start":"","footnotes":""},"research-area":[13561,13556,13562,13548,13558,13568],"msr-group-type":[243694],"msr-locale":[268875],"msr-impact-theme":[],"class_list":["post-740044","msr-group","type-msr-group","status-publish","has-post-thumbnail","hentry","msr-research-area-algorithms","msr-research-area-artificial-intelligence","msr-research-area-computer-vision","msr-research-area-economics","msr-research-area-security-privacy-cryptography","msr-research-area-technology-for-emerging-markets","msr-group-type-group","msr-locale-en_us"],"msr_group_start":"","msr_detailed_description":"","msr_further_details":"","msr_hero_images":[],"msr_research_lab":[],"related-researchers":[],"related-publications":[675198,782893,789491,805708,805744,805918,810634,815506,826078,826105,826114,826129,826144,826210],"related-downloads":[],"related-videos":[],"related-projects":[681471,739195],"related-events":[],"related-opportunities":[],"related-posts":[],"tab-content":[{"id":0,"name":"Publications","content":""}],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/740044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-group"}],"version-history":[{"count":71,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/740044\/revisions"}],"predecessor-version":[{"id":934086,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/740044\/revisions\/934086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media\/825358"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media?parent=740044"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=740044"},{"taxonomy":"msr-group-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-group-type?post=740044"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=740044"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=740044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}