search menu icon-carat-right cmu-wordmark

Discovering Unknown Network Activity Using Graphs and Computer Network Data

Poster
This poster illustrates how to use broad, deep computer network data, statistics, and graph algorithms to identify and prioritize anomalous network activity.
Publisher

Software Engineering Institute

Abstract

This FloCon 2014 poster illustrates how to use broad and deep computer network data (e.g., netflow, web activity, and DNS requests), statistics, and graph algorithms to automatically identify and prioritize anomalous network activity.