Replies: 3 comments 7 replies
-
This is tough.. i'm not going to say it cant be done.. but i havent seen anyone do it well. ML in IDS's and in threat detection is kind of one of the holy grails of cyber securty. All the big vendors are fighting for the same thing. I worked with a team of researchers at a major university in the US for about 2 yrs to create baselines of businesses so we could find abnormal network traffic. There were just too many variables and network traffic changes pretty quickly. i'm not trying to dishearten you, but its not a simple problem. |
Beta Was this translation helpful? Give feedback.
-
@e101sg did you find anything yet? I'm currently studying at school, and I'm planning on doing some research around ML and honeypots as well. Would love to start from somewhere. |
Beta Was this translation helpful? Give feedback.
-
these are my thoughts.. i'm no expert.. so i could be totally talking out of my ass. but i do have a little experience in this. A few things:
An approach you could take.. or a thought would be.. do some kind of analysis comparing the two networks. one network, network (1) will be all network scans and attacks.. the other (network 2) will have good traffic too. somehow use that for your model . |
Beta Was this translation helpful? Give feedback.
-
Dear friends,
Greetings! I'm working on an adaptive honeypot proof of concept project. Elastic tools is helpful on the T-Pot. Elastic Machine Learning, however, is only free for 30 days. When our team contacted the Elastic sales team, they informed us that it was possible to enable Elastic ML on its own. (Need to purchase an expensive cloud-based solution, which not suitable for us).
We require some sort of classification using ML based on the logs and network activity from Honeypot. Any suggestions on ML tools or any alternative to Elastic ML ? Any thoughts, useful. Thanks a lot :)
Cheers!
Chandra
Beta Was this translation helpful? Give feedback.
All reactions