Skip to main content

System Event Analytics Heuristic Observation and Research for Security Events (SEAHORSE)

System administrators, network engineers, security analysts, and yes, even developers, rely on log files as part of their day-to-day work. What happens if we look between the lines?

Correlating dozens of protocols from net flow to application crash dumps allows us to see, and possibly predict, failures across even the most complex infrastructures. This project will aid us in constructing complete system inventory maps and tracking exposed vulnerabilities in real-time across multiple platforms.