background preloader

Projects - *ORA

Projects - *ORA
Overview | People | Sponsors | Publications | Hardware Requirements | Software | Training & Sample Data *ORA is a dynamic meta-network assessment and analysis tool developed by CASOS at Carnegie Mellon. It contains hundreds of social network, dynamic network metrics, trail metrics, procedures for grouping nodes, identifying local patterns, comparing and contrasting networks, groups, and individuals from a dynamic meta-network perspective. *ORA has been used to examine how networks change through space and time, contains procedures for moving back and forth between trail data (e.g. who was where when) and network data (who is connected to whom, who is connected to where …), and has a variety of geo-spatial network metrics, and change detection techniques. *ORA can handle multi-mode, multi-plex, multi-level networks. Based on network theory, social psychology, operations research, and management theory a series of measures of “criticality” have been developed at CMU. Related:  Cyber Situational Awareness

mapequation.org P-graphs and Pajek -- Douglas R. White The p-graph is designed to graphically represent social networks that include, but are not limited to, kinship and marriage ties. In the general case there are two types of vertices in these graphs. One type of vertex represents organizations: families, business, or other groups to which individuals belong. The other type of vertex represents an individual and a linkage between this individual and a group. This second type of vertex exemplifies the defining feature of p-graphs: it has a maximum outdegree of two directed arcs, and the relation between vertices defined by these arcs is one of strict (temporal) order. Program Pajek for large network analysis has been implemented in various versions of the p-graph format. GEDCOM - P-graph GEDCOM - bipartite P-graph GEDCOM - P-graph+labels (to add labels on the arcs or lines of the graph) see: topical bibliography on p-graphs The arcs in a p-graph, in any case, represent individuals with specific affiliations to families or groups.

Powerful ‘Flame’ cyberweapon tied to popular Angry Birds game May 28, 2012: A screenshot from researchers at Kaspersky Labs shows the code behind Flame, called "the most sophisticated cyber weapon yet unleashed."Kaspersky Labs The most sophisticated and powerful cyberweapon uncovered to date was written in the LUA computer language, cyber security experts tell Fox News -- the same one used to make the incredibly popular Angry Birds game. LUA is favored by game programmers because it’s easy to use and easy to embed. “The people who developed the malware … found an ingenious way to use a code not part and parcel of a hacker’s normal arsenal, and that made it harder to detect,” he told Fox News. 'They found an ingenious way to use a code not part of a hacker’s normal arsenal But this new weapon is twenty times the size of earlier cyberbombs and far more powerful, making it practically an army on its own, said Roel Schouwenberg, a senior security researcher with Kaspersky Labs. “Flame is a cyberespionage operation,” he told FoxNews.com.

Powerbase Tulip AutoMap: Project Overview | People | Sponsors | Publications | Hardware Requirements | Software | Training & Sample Data AutoMap is a text mining tool developed by CASOS at Carnegie Mellon. Input: one or more unstructured texts. Output: DyNetML files and CS files. AutoMap enables the extraction of information from texts using Network Text Analysis methods. AutoMap exists as part of a text mining suite that includes a series of pre-processors for cleaning the raw texts so that they can be processed and a set of post-processor that employ semantic inferencing to improve the coding and deduce missing information. AutoMap uses parts of speech tagging and proximity analysis to do computer-assisted Network Text Analysis (NTA). AutoMap subsumes classical Content Analysis by analyzing the existence, frequencies, and covariance of terms and themes. AutoMap has been implemented in Java 1.7. It can operate in both a front end with gui, and backend mode. Main functionalities of AutoMap are: "From Texts to Networks"

Online BackTrack Security Training by Offensive Security The Creators of BackTrack have developed training that will take you through all aspects of a penetration test. Whether you are a seasoned penetration tester or just starting off, we have a course that can help you take your skills to the next level. Our online courses are designed to give you flexibility to work at your own pace. Our flagship course, Penetration Testing With Kali (PWB) will open your eyes to the skills needed to perform a penetration test from A to Z. After that you can move on to Cracking the Perimeter (CTP) – which focuses on exploitation using many of the skills you learned in the PWB class. Our courses are designed to work with a combination of our videos, pdf’s and a full lab environment. If you want to be a proffesional in the field, the way to go about it is to train in security penetration testing with the best.

Data Driven Journalism Cytoscape: An Open Source Platform for Complex Network Analysis and Visualization Palentir analysis software [Archive] - SOCNET: The Special Operations Community Network You make a couple of valid points- but... 400 messages a day is unrealistic for anybody beyond the beltline. And there aren't even that many worth a shit to bother with putting in there in the first place if we're talking downrange. I think we're just going to have to agree to disagree on this. If the only reporting you bother looking at are from the local field collectors, then yeah, 400 a day is a lot. Experience tells me that local field collection is usually insufficient to build any of the needed products, particularly along lines of recent methodologies like SNA, HT or CFA, you're only getting a fractional look at the situation in any of those cases. (I'm certainly not saying i2 solves this either). The whole strength of Palantir is that it is tied down to a sever. I agree that this is a strength, but with the following caveat. Field experience tells me that that is rare. Tying yourself to a server is like being a fireman. Man, you are preaching to the choir here! You should though.

Set up your own Pen-testing/Hacking Lab Network using a Single System | www The only thing to look for is your systems hardware configuration. You should have minimum 2 GB RAM but it is highly recommended to use 3 GB RAM for a 32 bit operating system. We will be using Oracle VirtualBox in this tutorial. You can download virtualbox from this link [Reference 1]. Once you have installed Vbox, the next step is to download the Extensions pack. You can get it from this link [Reference 2] Once you have followed these initial steps, you are half done.

Related: