By Steve Patton (@spttnnh)
Mon 03 March 2014 | tags: datavis, dataviz, AlienVault, data analysis. data management, -- (permalink)

In Part 1 we looked at acquiring raw data, and wrangling it into a time series dataset. Now we will examine AlienVault types in the reputation database. Listing 3-22 of Data-Driven Security shows R code that groups type categories into a larger group of “multiples” when there is a semicolon ...


By Bob Rudis (@hrbrmstr)
Thu 20 February 2014 | tags: data analysis, twitter, data visualization, datavis, passwords, -- (permalink)

The topic of “dump monitoring”—i.e. looking for lists of stolen/hacked credentials or notices of targted hacking—came up on the securitymetrics.org mailing list recently and that seemed like a good opportunity for a quick post on how to use Twitter as a data source and how ...


By Steve Patton (@spttnnh)
Mon 17 February 2014 | tags: datavis, dataviz, AlienVault, data analysis, data management, -- (permalink)

Chapter 3 of Data-Driven Security explores one download of the AlienVault reputation database. As you can see from the book, the reputation database has many interesting aspects to explore, including country profiles, risk versus reliability, and a variety of threat types. Of course, one download represents a simple snapshot in ...


« Page 2 / 2