Главная
Study mode:
on
1
Introduction
2
Sharing is Caring
3
Context
4
Logs
5
Visualization
6
Proxy Web Gem
7
Authorization API
8
Elastic Search API
9
Last Search Proxy
10
Log Management Visualization
11
Pie Charts
12
Data parsing
Description:
Explore attack patterns and visualization techniques in this 50-minute conference talk from BSides Detroit 2017. Dive into log analysis, data parsing, and visualization methods to better understand hacker behavior. Learn about proxy web gems, authorization APIs, and Elastic Search APIs for improved log management. Discover how to create meaningful pie charts and other visual representations to effectively communicate security insights and identify potential threats.

Plotting Hackers - Visualizing Attack Patterns

Add to list