Cisco Blogs

Search Results

360 posts found

Big Data in Security – Part V: Anti-Phishing in the Cloud

In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to be effective and potent. What is TRAC currently doing in this space to protect Cisco customers? Brennan: One of the ways that we have traditionally co…

Read More >>

Tags: , , , , , , , , , , , ,

Big Data in Security – Part IV: Email Auto Rule Scoring on Hadoop

Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning approaches on Hadoop. What is ARS and what problem is it trying to solve? Dazhuo: From a high-level view, Auto Rule Scoring (ARS) is the machine learning system for our anti-spam system. The system receives…

Read More >>

Tags: , , , , , , , , , , , , , , , ,

Big Data in Security – Part III: Graph Analytics

Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are they trying to solve? Michael: Disparate data types have a lot of connections between them and not just the types of connections that have been well r…

Read More >>

Tags: , , , , , , , , , , , , ,

A Room with a View (of Crucial Big Data Insights)

What’s the problem with Big Data? You guessed right — it’s BIG. Big Data empowers organizations to discern patterns that were once invisible, leading to breakthrough ideas and transformed business performance. But there is simply so much of it, and from such myriad sources — customers, competitors, mobile, social, web, transactional, operational, internal, external, structured, and unstructured — that, for many organizations, Big Data is overwhe…

Read More >>

Tags: , , , , , , , , , , ,

Big Data in Security – Part II: The AMPLab Stack

Following part one of our Big Data in Security series on TRAC tools, I caught up with talented data scientist Mahdi Namazifar to discuss TRAC’s work with the Berkeley AMPLab Big Data stack. Researchers at University of California, Berkeley AMPLab built this open source Berkeley Data Analytics Stack (BDAS), starting at the bottom what is Mesos? AMPLab is looking at the big data problem from a slightly different perspective, a novel perspec…

Read More >>

Tags: , , , , , , , , , , , , , , , , , , ,