TRAC Big Data Analysis

July 14, 2014

SECURITY

Big Data: Observing a Phishing Attack Over Years

Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this kind have been around since 1995, evolving in sop…

December 13, 2013

SECURITY

Big Data in Security – Part V: Anti-Phishing in the Cloud

In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to b…

December 11, 2013

SECURITY

Big Data in Security – Part III: Graph Analytics

Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are t…

December 10, 2013

SECURITY

Big Data in Security – Part II: The AMPLab Stack

Following part one of our Big Data in Security series on TRAC tools, I caught up with talented data scientist Mahdi Namazifar to discuss TRAC’s work with the Berkeley AMPLab Big Data stack. Researchers at University of California, Berkeley AMPLab built this open source Berkeley Data Analytics…

December 9, 2013

SECURITY

Big Data in Security – Part I: TRAC Tools

Recently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of five in this series where Jisheng Wang, John Conley,…