Analysis of authentication events and graphs using Python

Loading...
Thumbnail Image
If you need an accessible version of this item, please email your request to iusw@iu.edu so that they may create one and provide it to you.
Date
2015-05
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools.
Description
Keywords
cybersecurity, authentication, graphs, software, Python
Citation
DOI
Link(s) to data and video for this item
Relation
Rights
This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License.
Type
Presentation
Software