Shortcomings of traditional tools
Traditional signature-based defenses are becoming insufficient for the following reasons:
- Evolution of attacker techniques: Security rules are static by nature, and as the software evolves, new vulnerabilities are found and new attacker techniques arise that can be used to circumvent the defenses. This requires the security operations teams to constantly change the security rules to keep their false positive and false negative rate at a minimum, often with limited resources.
- Insider threats: Static rules can often be circumvented by insiders who have knowledge and are part of the organization of the systems (for example, disgruntled employees) or attackers with stolen credentials. They can adjust their behavior to look similar to the behavior of a valid user and stay under the radar while performing their attacker activities.
- Context is needed: Many times, attacker behavior can look like normal behavior without having a full context...