search menu icon-carat-right cmu-wordmark

Four Valuable Data Sources for Network Security Analytics

October 2017 Presentation
Timothy J. Shimeall

This webinar will focus on the development and application of combined data analytics and will offer several examples of analytics that combine domain resolution data, network device inventory and configuration data.

Publisher:

Software Engineering Institute

Abstract

This webinar will focus on the development and application of combined data analytics and will offer several examples of analytics that combine domain resolution data, network device inventory and configuration data, network flow records, and intrusion detection system alerts. An overall approach to analytic development, first covered in a previous webinar, will be further applied to the data. Interaction with webinar participants will be used to both guide the discussion and to facilitate the selection of examples. The webinar will cover

  • Specific characteristics of each of these sources of data, along with how they can inform security operations
  • Applying analysis at scale that combines multiple data sources, along with exploring the analytic model
  • Using the results of these analytics to further understand and improve network security
  • Open questions and answers with the participants