The Security Analytics Project: Alternatives In Analysis

No ratings

Presented at Blackhat USA 2007 by

With the advent of advanced data collection techniques in the form of honeypots, distribured honeynets, honey clients and malware collectors, data collected from these mechanisms becomes an abundant resource. One must remember though that the value of data is often only as good as the analysis technique used.