Exploratory Threat Analytics using Jupyter Notebooks
Watch the detailed Presentation & Explaination of my talk on this topic here
Why Notebooks & not SIEM/EDR or any other Tool?
SIEM is for Log Collection & Detection, Case Management is for Notes & Annotation, Let's use Jupyter for Investigation
Let's Explore a simple Investigation of Finding Suspicious Powershell Executions.
Use-Case : Data from Wherever you want (Security Tools/S3/Online Datasets/Git repo)
Use-Case: Data Analysis Capabilities
Use-Case : Statistical Capabilities at your disposal
Use-Case: SuperCharged API Utilization
Timestamp
Process
Source_ip
Source_port
Destination_ip
Destination_port
Use-Case - Data Enrichment
Use-Case - Data Visualization powers (You are free to use your favourite library, Matplotlib, seaborn, plotly etc etc..)
Use-Case - programmatic Control over Data, Wrangling, tuning, sanitization, enrichment, whatever you need !!!
Timestamp_date
Commandline
0

What you've achieved by Using Jupyter Notebooks for conducting this Analysis :
Last updated