Title:
Network Behavior
Poster
Preview Converted Images may contain errors
Abstract
UNH's Palo Alto firewall infrastructure generates millions of log entries per day, capturing metadata for every allowed, denied, and dropped network session. Manually identifying meaningful deviations like an unusual spike in traffic from a foreign country or a rare application surging in volume is not possible at this scale without automated tooling. This project delivers an end-to-end firewall analytics platform consisting of a daily log ingestion pipeline and an interactive web dashboard. Logs are imported in chunks using Python and pandas, stored in SQLite, and processed against rolling 30-, 90-, and 180-day baselines. Three detection methods identify anomalies: categorical frequency shifts, z-score deviations, and unique-value-count ratio changes. Detected anomalies are scored LOW through CRITICAL using a weighted model that accounts for field security relevance, trend persistence, and traffic volume. A dampening mechanism suppresses false positives from sparse fields. Each morning, a cron shell script completes the full ingest-detect-report pipeline and delivers HTML anomaly reports via email for alerts above a configurable severity threshold. A Flask web dashboard which is served over Apache/WSGI, provides geographic mapping, traffic timeline, baseline comparison, and filtered log search views without requiring SQL knowledge or direct log access.
Authors
| First Name |
Last Name |
|
Evan
|
White
|
|
Sam
|
Howard
|
|
Matthew
|
Szpak
|
|
Matthew
|
Cariseo
|
Advisors:
| Full Name |
|
Scott Kitterman
|
Leave a comment
Submission Details
Conference URC
Event Interdisciplinary Science and Engineering (ISE)
Department Computer Science (ISE)
Group Computer Science- Data Science
Added April 20, 2026, 12:53 p.m.
Updated April 20, 2026, 12:54 p.m.
See More Department Presentations Here