Analysis of authentication events and graphs using Python
Loading...
Can’t use the file because of accessibility barriers? Contact us with the title of the item, permanent link, and specifics of your accommodation need.
Date
2015-05
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Permanent Link
Abstract
Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools.
Description
Keywords
cybersecurity, authentication, graphs, software, Python
Citation
Journal
DOI
Link(s) to data and video for this item
Relation
Rights
This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License.
http://creativecommons.org/licenses/by/3.0/deed.en_US
http://creativecommons.org/licenses/by/3.0/deed.en_US
Type
Presentation
Software
Software