Lab6 (1)

pdf

School

Centennial College *

*We aren’t endorsed by this school

Course

101

Subject

Electrical Engineering

Date

Apr 3, 2024

Type

pdf

Pages

1

Uploaded by HighnessBraveryButterfly42

Report
SRT411: Digital Data Analysis Winter 2023 pg. 1 SRT411: Lab 06 (5%) Anomaly Detection Objective The goal of this lab is to detect different types of anomalies using large pieces of data. Read the description given on the webpage and load the data into Elasticsearch for each task. Tasks Task 0: Create a report 1. Create a word document, and write the details of your lab completion in it. This will serve as proof that the lab was satisfactorily completed. 2. Each heading should be a task (Task 1, Task 2, etc.), with screenshots and descriptions that prove the task was completed satisfactorily. Fill these headings out as you complete the lab. Task 1: Login Anomaly Detection Download the data set from the link: Login Anomaly Detection In this task, you will identify the anomalous login locations from the given dataset. An employee can log in from within a radius of 10 miles from home or office in the headquarter (HQ), Paris, London, or Luxembourg. Any other login locations are suspicious. You can make use of map or any other plot to display the normal login versus the anomalous ones. You need to make multiple layers with different colors and will be needing DNS queries for this task. Task 2: Resource Anomaly Detection Download the data set from the link: Resource Anomaly Detection In this task, you will detect anomalous resource accesses, i.e., an employee accesses resource(s) outside of the work department. Create appropriate visuals to identify the normal versus suspicious access. For possible example could be number of employees accessing resources belonging to their departments versus number of employees accessing resources that does not belong to their department. Task 3: Activity Anomaly Detection Download the data set from the link: Activity Anomaly Detection In this task, you will analyze the employee activity log to detect incidents in which a previous employee tries to access company resources after he/she has left the company. Create appropriate visuals to identify the normal versus suspicious access. Make sure to include the following in your report: Add all your visualization to a dashboard. Add your dashboard to the report. Include all the visuals in the report along with proper explanations as how you have created them and what information can be extracted from it. Significance of the visuals. The biggest finding based on the data set. What have you learned from the data and how are you going to use it ? Deliverables The written report in pdf format
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help