O'Reilly logo

Information Security Analytics by I Miyamoto, Jason Martin, Mark Talabis, Robert McPherson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

Analytics and Incident Response

Abstract

This chapter focuses on the analysis of data so that you have the skillset to analyze the large volume of most organizations already collect. We cover the use of open-source tools, such as Hadoop, MapReduce, R, and Mahout, so that you have a solid foundation for understanding the analytical process on any platform. Specifically, we demonstrate the power of these tools by applying them to a typical security scenario—analyzing very large collections of server log files. The tools and methods can be applied to the analysis of data from other systems sources as well.

Keywords

Hadoop; Mahout; MapReduce; R; Security analytics; Server logs
Information in This Chapter
▪ Scenarios and Challenges in Intrusions ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required