CySER Workshop
Graph Mining for Insider Threat Detection
Resources
Documents
Slides
Exercises
(require UNIX)
Software (require UNIX)
SUBDUE Graph Miner (
CSubdue.zip
). Also available on GitHub at
https://github.com/holderlb/CSubdue
. See also main site at
http://ailab.wsu.edu/subdue
.
GBAD Graph-Based Anomaly Detection (
GBAD.zip
). Also available at
http://www.gbad.info
.
Graphviz Graph Visualizer (
https://graphviz.org
).
Datasets
Government ID processing example (
idprocess2.g
)
Enron email (
https://www.cs.cmu.edu/~enron
)
VAST 2009 Challenge: Embassy Leak (
link
)
Center for Applied Internet Data Analysis (CAIDA) (
https://www.caida.org
)