KoalaBase

"South East Queensland koalas are currently undergoing a major population decline. Data on major causes of koala disease or injury has been collected, but no detailed epidemiological studies on morbidity and mortality exist. Additionally, a lack of standardised pathological analysis and scientific data management procedures to compile and analyse disease and mortalities, are major constraints on... Continue Reading →

Internet malware blooms

https://vimeo.com/95262756 A homage to the "hpfriends" malware analysis framework. This video is a stylized animation demonstrating the prevalence of Internet malware. Branches in these "malware blooms" occur per country, then new branches for each city and each node is an IP address in that city. As new branches occur and old ones recede, the bloom... Continue Reading →

Using Visualization to detect card-present ATM Fraud

Details of this work are available on request. This paper was presented at the following conferences. - 45th Hawaii International Conference on System Sciences (HICSS) in 2011 - American Academy of Forensic Sciences (AAFS) in 2012 Abstract: Mitigating card-present fraud can be easy when the behaviours associated with the actions have been identified. The situation... Continue Reading →

Mouse tracking

https://vimeo.com/16152832 I wanted to find some interesting analog data which could be collected and analyzed quickly, and for this analysis to produce reasonably useful real-world output. Well, I didn't have to look much further than the humble computer input device, the mouse (or in this case, a trackpad. All recordable by-products like IOGraph). The goal... Continue Reading →

Trojan Pong

https://vimeo.com/10861003 This project was done for the Shadowserver Foundation. They are a volunteer, Not for Profit organization who deal with the capture, analysis and dissemination of data and intelligence relating to nefarious activity on the internet. Shadowserver provided us with one day worth of data (which was several gigabytes) for us to apply some known techniques,... Continue Reading →

Circos – Applying a genetic mapping tool to Internet DDoS attack campaigns

This project was done for the Shadowserver Foundation. They are a volunteer, Not for Profit organization who deal with the capture, analysis and dissemination of data and intelligence relating to nefarious activity on the internet. Shadowserver provided us with one day worth of data for us to apply some known techniques, and experiment with some new... Continue Reading →

Time based heatmaps

This is a very simple heatmap and is used to analyze "busy times". Quite simply, the brighter the dot, the more activity. Any metric that can be quantified against time may be mapped, examples include: Sales volumes Trading volumes Foot traffic through store departments Call Center activity Road traffic Heart-rate, blood pressure, health data  

Geo Heatmaps

Heatmaps are one of the most intuitive mapping styles. This form of heatmap often poses further, more valuable questions that can then be explored. For example "Why are so many people in the western suburbs of Sydney buying/using my product? What else do I need to do to take advantage of this trend?" Similarly one... Continue Reading →

Internet attack relationship mapping

Relationships. Amongst a mass of unstructured data, hidden patterns can emerge. These 'link graphs' show some compelling relationships between attacker and victim in the realm of Internet security. Adding color to these graphs further adds to the value of the diagram by showing active nodes in the center (in red) and quieter attackers on the... Continue Reading →

Frog sightings in South Australia

As part of the 'Government 2.0 workforce' Mashup Australia initiative, I worked on several applications. For one project I used a data set from the South Australian Department For Environment and Heritage containing over 6,700 frog sighting notes dating back to 1947 and having 20 species identified. I prepared some heatmaps of this data, and hope that... Continue Reading →

SPAM animation

This animation shows the location of computers that sent SPAM email over a period of time. Does SPAM follow the sun, watch and find out!  

Wordclouds

These word  clouds were created from a large corpus of SPAM email.  The corpus was divided into three scam types and the most prominent words are shown by the word clouds. Phishing emails Money Mule emails Advance Fee Fraud email (AKA 419 scams)

Up ↑

%d bloggers like this: