2025_EML Capstone Projects
The goal was to demonstrate the early capability of the system to flag outliers. An example of preliminary analysis for normal vs. suspicious behavior as follow:
■ Simulated chart displays average logins vs flagged anomalies, and scatter plot clustering normal vs anomalous sessions. ■ Dataset used for 50 users over 30 days to record daily activities such as logins, file access and privilege escalations. ■ 5 injected anomalies included to simulate suspicious behavior. ■ Unusually high logins, file accesses and escalations are considered injected anomalies. ■ Descriptive stats used to show activities between normal users and potential anomalies.
Back to Table of Contents
Made with FlippingBook - professional solution for displaying marketing and sales documents online