Analysis of authentication events and graphs using Python

Loading...
Thumbnail Image
Can’t use the file because of accessibility barriers? Contact us with the title of the item, permanent link, and specifics of your accommodation need.

Date

2015-05

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools.

Description

Keywords

cybersecurity, authentication, graphs, software, Python

Citation

Journal

DOI

Link(s) to data and video for this item

Relation

Rights

This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License.

Type

Presentation
Software