By Bob Rudis (@hrbrmstr)
Tue 12 August 2014
|
tags:
r,
rstats,
analysis,
-- (permalink)
We’ve got some new and updated R packages that are (hopefully) helpful to security folks who are endeavouring to use R in their quest to find and prevent malicious activity. All packages now incorporate a testthat
workflow and are fully roxygen
-ized and present some best practices in R ...
By Bob Rudis (@hrbrmstr) & Jay Jacobs (@jayjacobs)
Sun 20 April 2014
|
tags:
python,
ssl,
heartbleed,
analysis,
contest,
-- (permalink)
The fine folks over as SANS ISC tweeted this out last week:
The GlobalSign CRL just "exploded" with > 54k revocations today. removed it from our graph for now. https://t.co/JZdDu7ulK7
— SANS ISC (@sans_isc) April 16, 2014
That piqued the curiosity of both of us, especially @hrbrmstr
after him ...
By Jay Jacobs (@jayjacobs)
Thu 23 January 2014
|
tags:
EDA,
analysis,
honeypot,
R,
-- (permalink)
This is part 2 of a series (visit part 1). I will be looking at destination ports in this post.
Bob and I spent quite a bit of time early on in the book showing what we can learn from IP addresses. But let’s ...
By Jay Jacobs (@jayjacobs)
Thu 16 January 2014
|
tags:
EDA,
analysis,
honeypot,
R,
-- (permalink)
I like honeypots. Not so much for what they show about individual attackers, but for what they can show about the trends across attackers. I’ve struggled to get good honeypot data though, so if anyone has access to data (or people with data) and ...
By Bob Rudis (@hrbrmstr)
Tue 14 January 2014
|
tags:
analysis,
prediction,
weis,
-- (permalink)
I found a thought-provoking new paper by Robert Axelrod and Rumen Iliev thanks to a tweet by @ironfog:
interesting paper: predicting the timing of the cybers https://t.co/JmXPbbjVrf @MrMeritology @jayjacobs @hrbrmstr @alexhutton #haveNotReadYet
— Ben (@ironfog) January 14, 2014
The Science article provides a good overview of the paper ...