Analysis of authentication events and graphs using Python

Abstract
Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools.
Description
Keywords
cybersecurity, authentication, graphs, software, Python
Citation
DOI
Link(s) to data and video for this item
Relation
Rights
This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License.
Type
Presentation
Software