I am reaching out on behalf of Tetiana Gladkikh??,??Taras Hnot??and??Volodymyr Solskyy of SoftServe. With your focus on explaining how to manage big data and to help improve businesses ability to maneuver, we were wondering if you would be interested in a unique 3 part series they created on anomaly detection.
With the rise of cyberattacks at an all-time, high??network security is becoming an integral part of companies day-to-day operations. Those perpetrating the??attacks are just as sophisticated and skilled as those trying to thwart them, so how can we solve for that???
One possible solution to this problem is the development of systems that identify unusual user network behavior, based on analysis of network activity logs.??In this 3 part??series they will examine:??
1. ???What an Anomaly detection method for analyzing network activity logs would look like.
2. Take an in-depth look into informational security risk identification by detecting deviations from the typical network activities.??
3. Examine how the 3 suggested solutions work when combined??
This series dives deeply into anomaly detection and has been written by a??software security engineer, a data scientist and an AI/Artificial Neural Network expert. All who have??collaborated??together to present 3 possible solutions along with the??examination of??all aspects of??those solutions from their own disciplines creating a complete and??thorough??picture.
Let me know if this piques your interest, and let???s discuss further.??
I hope to hear from you soon!??
Content Manager, SoftServe Inc.