Analysis of authentication events and graphs using Python
Loading...
Date
2015-05
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Permanent Link
Abstract
Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools.
Description
Keywords
cybersecurity, authentication, graphs, software, Python
Citation
DOI
Link(s) to data and video for this item
Relation
Rights
This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License.
http://creativecommons.org/licenses/by/3.0/deed.en_US
http://creativecommons.org/licenses/by/3.0/deed.en_US
Type
Presentation
Software
Software