<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: about Active Learning in steathwatch in Security Analytics</title>
    <link>https://community.cisco.com/t5/security-analytics/about-active-learning-in-steathwatch/m-p/3505890#M74</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply,brford.&lt;/P&gt;&lt;P&gt;so you meant learning network is no longer sold independently but sold as a component of stealthwatch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And i have another question,as mentioned in &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://clnv.s3.amazonaws.com/2015/usa/pdf/BRKSEC-3056.pdf" rel="nofollow" target="_blank"&gt;https://clnv.s3.amazonaws.com/2015/usa/pdf/BRKSEC-3056.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Anomaly detection in stealthwatch is (usually but not exclusively) implemented by unsupervised algorithm, more in detail, it model what is normal behaviour for some time(few days or few weeks in customer environment). But how does the user guarantee that the network environment is normal during this period, whether the network administrator must intervene to ensure that no abnormalities occur?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" lang="en"&gt;If my description is not clear enough, please let me know,thank you very much!&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Mar 2018 01:45:48 GMT</pubDate>
    <dc:creator>lin jia</dc:creator>
    <dc:date>2018-03-20T01:45:48Z</dc:date>
    <item>
      <title>about Active Learning in steathwatch</title>
      <link>https://community.cisco.com/t5/security-analytics/about-active-learning-in-steathwatch/m-p/3505888#M72</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/sln/configuration/guide/Learning_Network_License_Configuration_Guide_v_1_1/SLN_Configuration_Guide_chapter_00.html" title="https://www.cisco.com/c/en/us/td/docs/security/sln/configuration/guide/Learning_Network_License_Configuration_Guide_v_1_1/SLN_Configuration_Guide_chapter_00.html"&gt;Cisco Stealthwatch Learning Network License Configuration Guide, Version 1.1 - Introduction [Cisco Stealthwatch Learning…&lt;/A&gt; says:"&lt;/P&gt;&lt;H5 class="topictitle5" style="margin-top: 20px; margin-bottom: 8px; font-family: CiscoSans, Arial, sans-serif; font-size: 1.6rem; font-weight: 400; color: #39393b;"&gt;Active Learning&lt;/H5&gt;&lt;P style="margin-bottom: 12px; font-family: inherit; font-size: 1.4rem; font-style: inherit;"&gt;As a user, you can review the reported anomalies from the &lt;SPAN style="font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit;"&gt;controller web&lt;/SPAN&gt; UI. You have the option of assigning relevance feedback to anomalies. The system incorporates this reinforcement into the &lt;SPAN style="font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit;"&gt;DRL&lt;/SPAN&gt; algorithms, allowing the system to learn based on your feedback. This improves anomaly detection, and allows the system to adapt to your needs, and better report relevant anomalies.&lt;/P&gt;&lt;P style="margin-top: 12px; font-family: inherit; font-size: 1.4rem; font-style: inherit;"&gt;The system generates its initial baseline and identifies anomalies without user feedback. You do not need to provide relevance feedback, but providing this feedback improves the system's detection capabilities.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i think getting feedback by user through 'like' or 'dislike'&amp;nbsp; is a m&lt;SPAN class="short_text" lang="en"&gt;anual tagging way, and it is not efficient. so i wonder can it works well&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2018 06:30:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/about-active-learning-in-steathwatch/m-p/3505888#M72</guid>
      <dc:creator>lin jia</dc:creator>
      <dc:date>2018-03-19T06:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: about Active Learning in steathwatch</title>
      <link>https://community.cisco.com/t5/security-analytics/about-active-learning-in-steathwatch/m-p/3505889#M73</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First you should know that Stealthwatch Learning Network was discontinued last year.&amp;nbsp; This is not a product that you can buy anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That said, it's important when any machine learning solution is deployed that there be feedback mechanisms in place that allow for users to 'score' findings.&amp;nbsp; This is critical for the solution provider to be able to continuously train their machine learning algorithms and report on the accuracy of their solutions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Stealthwatch Learning Network product has been integrated back into Stealthwatch and the Engineers that developed this are working on incorporating this into Stealthwatch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this response is useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2018 19:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/about-active-learning-in-steathwatch/m-p/3505889#M73</guid>
      <dc:creator>brford</dc:creator>
      <dc:date>2018-03-19T19:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: about Active Learning in steathwatch</title>
      <link>https://community.cisco.com/t5/security-analytics/about-active-learning-in-steathwatch/m-p/3505890#M74</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply,brford.&lt;/P&gt;&lt;P&gt;so you meant learning network is no longer sold independently but sold as a component of stealthwatch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And i have another question,as mentioned in &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://clnv.s3.amazonaws.com/2015/usa/pdf/BRKSEC-3056.pdf" rel="nofollow" target="_blank"&gt;https://clnv.s3.amazonaws.com/2015/usa/pdf/BRKSEC-3056.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Anomaly detection in stealthwatch is (usually but not exclusively) implemented by unsupervised algorithm, more in detail, it model what is normal behaviour for some time(few days or few weeks in customer environment). But how does the user guarantee that the network environment is normal during this period, whether the network administrator must intervene to ensure that no abnormalities occur?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" lang="en"&gt;If my description is not clear enough, please let me know,thank you very much!&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Mar 2018 01:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/about-active-learning-in-steathwatch/m-p/3505890#M74</guid>
      <dc:creator>lin jia</dc:creator>
      <dc:date>2018-03-20T01:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: about Active Learning in steathwatch</title>
      <link>https://community.cisco.com/t5/security-analytics/about-active-learning-in-steathwatch/m-p/3505891#M75</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a very common question raised when almost any security product is installed.&amp;nbsp; How do we know what normal is? What if my site is under attack or has been compromised when the security product is installed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way that I address this question is that it is important that the security product be able to display information about the data that makes up it's baseline.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Stealthwatch Enterprise the user has the capability of being able to drill down on an alarm to see where the data that contributes to that alarm is coming from. You can track backwards to see the exporter interface that contributed the data that drives a host alarm.&amp;nbsp; From that interface you can investigate everything that the exporter reports.&amp;nbsp; That gives the user the capability to assess that interface and compare it with another or compare the data exported at different points in time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's these comparisons that often yield issues to investigate.&amp;nbsp; Sometimes these issues are non malicious.&amp;nbsp; It could be a hardware fault in a network interface.&amp;nbsp; But sometimes they result in taking actions; such as deploying an access control list (ACL) to temporarily block traffic to determine which, if any applications might be impacted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sometimes you investigate and you find evidence of known malware and you mitigate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Apr 2018 15:33:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/about-active-learning-in-steathwatch/m-p/3505891#M75</guid>
      <dc:creator>brford</dc:creator>
      <dc:date>2018-04-02T15:33:39Z</dc:date>
    </item>
  </channel>
</rss>

