Objective:
- Explore when a compromise has occurred by a change in the pattern of communication
Data sources:
- Computer Security (Computer Network Traffic Data)
- http://statweb.stanford.edu/~sabatti/data.html
Tools:
- Tableau public
- Python Jupter Notebook
Results:
- https://public.tableau.com/profile/peter.le6443#!/vizhome/ComputerNetworkTrafficData/OverallClusters
- Enclosed Jupyter notebook