Sandeep Pisharody
YOU?
Author Swipe
View article: Anonymized Network Sensing Graph Challenge
Anonymized Network Sensing Graph Challenge Open
The MIT/IEEE/Amazon GraphChallenge encourages community approaches to developing new solutions for analyzing graphs and sparse data derived from social media, sensor feeds, and scientific data to discover relationships between events as th…
View article: What is Normal? A Big Data Observational Science Model of Anonymized Internet Traffic
What is Normal? A Big Data Observational Science Model of Anonymized Internet Traffic Open
Understanding what is normal is a key aspect of protecting a domain. Other domains invest heavily in observational science to develop models of normal behavior to better detect anomalies. Recent advances in high performance graph libraries…
View article: Teaching Network Traffic Matrices in an Interactive Game Environment
Teaching Network Traffic Matrices in an Interactive Game Environment Open
Understanding what is normal is a key aspect of protecting a domain. Other domains invest heavily in observational science to develop models of normal behavior to better detect anomalies. Recent advances in high performance graph libraries…
View article: Mapping of Internet "Coastlines" via Large Scale Anonymized Network Source Correlations
Mapping of Internet "Coastlines" via Large Scale Anonymized Network Source Correlations Open
Expanding the scientific tools available to protect computer networks can be aided by a deeper understanding of the underlying statistical distributions of network traffic and their potential geometric interpretations. Analyses of large sc…
View article: Focusing and Calibration of Large Scale Network Sensors using GraphBLAS Anonymized Hypersparse Matrices
Focusing and Calibration of Large Scale Network Sensors using GraphBLAS Anonymized Hypersparse Matrices Open
Defending community-owned cyber space requires community-based efforts. Large-scale network observations that uphold the highest regard for privacy are key to protecting our shared cyberspace. Deployment of the necessary network sensors re…
View article: Hypersparse Network Flow Analysis of Packets with GraphBLAS
Hypersparse Network Flow Analysis of Packets with GraphBLAS Open
Internet analysis is a major challenge due to the volume and rate of network traffic. In lieu of analyzing traffic as raw packets, network analysts often rely on compressed network flows (netflows) that contain the start time, stop time, s…
View article: Large Scale Enrichment and Statistical Cyber Characterization of Network Traffic (Enriquecimiento a gran escala y caracterización cibernética estadística del tráfico de red)
Large Scale Enrichment and Statistical Cyber Characterization of Network Traffic (Enriquecimiento a gran escala y caracterización cibernética estadística del tráfico de red) Open
Modern network sensors continuously produce enormous quantities of raw data that are beyond the capacity of human analysts. Cross-correlation of network sensors increases this challenge by enriching every network event with additional meta…
View article: Temporal Correlation of Internet Observatories and Outposts
Temporal Correlation of Internet Observatories and Outposts Open
The Internet has become a critical component of modern civilization requiring scientific exploration akin to endeavors to understand the land, sea, air, and space environments. Understanding the baseline statistical distributions of traffi…
View article: GraphBLAS on the Edge: Anonymized High Performance Streaming of Network Traffic
GraphBLAS on the Edge: Anonymized High Performance Streaming of Network Traffic Open
Long range detection is a cornerstone of defense in many operating domains (land, sea, undersea, air, space, ..,). In the cyber domain, long range detection requires the analysis of significant network traffic from a variety of observatori…
View article: Zero Botnets: An Observe-Pursue-Counter Approach
Zero Botnets: An Observe-Pursue-Counter Approach Open
Adversarial Internet robots (botnets) represent a growing threat to the safe use and stability of the Internet. Botnets can play a role in launching adversary reconnaissance (scanning and phishing), influence operations (upvoting), and fin…
View article: Spatial Temporal Analysis of 40,000,000,000,000 Internet Darkspace Packets
Spatial Temporal Analysis of 40,000,000,000,000 Internet Darkspace Packets Open
The Internet has never been more important to our society, and understanding\nthe behavior of the Internet is essential. The Center for Applied Internet Data\nAnalysis (CAIDA) Telescope observes a continuous stream of packets from an\nunso…
View article: Realizing Forward Defense in the Cyber Domain
Realizing Forward Defense in the Cyber Domain Open
With the recognition of cyberspace as an operating domain, concerted effort is now being placed on addressing it in the whole-of-domain manner found in land, sea, undersea, air, and space domains. Among the first steps in this effort is ap…
View article: SDN based Scalable MTD solution in Cloud Network
SDN based Scalable MTD solution in Cloud Network Open
Software-Defined Networking (SDN) has emerged as a framework for centralized command and control in cloud data centric environments. SDN separates data and control plane, which provides network administrator better visibility and policy en…