
In the annals of the Cold War history the events of September 26, 1983, play a significant part. Lieutenant Colonel Stanislav Petrov was on duty at the command center of the Soviet Union’s early-warning anti-ballistic missile system. The system, known as Oko, reported the launch of one intercontinental ballistic missile from the United States, followed by four more.
These operations included clandestine naval operations in the Barents, Norwegian, Black, and Baltic seas, as well as flights by American bombers directly toward Soviet airspace. These actions significantly strained relations between the United States and the Soviet Union.
Why the False Positive is bad
When an incident occurs a million and one question pops up in your head and one will most certainly be is this for real, or is it a false positive? And if so, why is that so bad? Consider the following:
- Resource Drain. If your security work is anything like mine jumping on a false positive event would stretch your resources to the maximum. Responding to false positives will be inefficient and increase your operational costs.
- Desensitization. If your system like the boy in Aesop’s old fables tricks the villagers by crying wolf all the time your team might stop responding or the real threat will be missed cause you are bogged down with false positives.
- Disruption. If the event triggers defensive actions that might lead to unnecessary downtime of normal operations.
- Loss of Confidence. Repeated false positives can erode confidence in the security system, leading to reduced effectiveness and potential vulnerabilities.
What to do?
- Tuning Security Systems: Adjust the sensitivity of the intrusion detection systems to reduce the number of alerts, which can help decrease the number of false positives.
- Whitelisting: Identify safe entities such as IP addresses, URLs, or applications known to be secure and add them to a whitelist so they won’t trigger alerts.
- Correlation Analysis: Use advanced analytics to correlate events and filter out noise. This can help distinguish between real threats and false positives.
- Threat Intelligence Feeds: Use threat intelligence feeds to gain information about the latest threats. This can help in distinguishing between false positives and actual threats.
- Regular Updates and Patches: Keep all systems, especially security systems, up-to-date with the latest patches and updates. This can help in reducing false positives triggered by outdated security definitions.
- Staff Training: Train staff to better understand the security systems and the nature of the threats. This can help them make better decisions when alerts are triggered.
Obviously, you can go into a lot more detail on each of these points and you can probably find a lot more but this is to get you thinking about your system and posture.
The main point here is that even though systems and AI is contributing and helping the human is not replaced yet or maybe never will be, you can’t only rely on what the system tells you.


Leave a comment