Skip to content

Most cyber solution solutions don't distinguish between everyday malware and advanced targeted attacks. Important alerts get lost in the noise of unimportant alerts, allowing attacks to breach security.

Notifications You must be signed in to change notification settings

adish1997/Security-Monitoring-System-using-ML

 
 

Repository files navigation

Security-Monitoring-System-using-ML

Most cyber solution solutions don't distinguish between everyday malware and advanced targeted attacks. Important alerts get lost in the noise of unimportant alerts, allowing attacks to breach security.

The solution is divided into multiple steps which are:

  1. Convert the given Dataset from Json to CSV along with wrangling of Data
  2. Preprocessing of Data which included feature engineering on Date-Time, dealing with categorical features, encoding the data and scaling the data.
  3. Used K-Means for clustering similar data groups and patterns to identify outliers in dataset
  4. Used Principal Component Analysis in order to visualise cluster of datasets.
  5. Used Long Short Term Memory (LSTM) Networks inorder to identify malicious patterns in time series log.

About

Most cyber solution solutions don't distinguish between everyday malware and advanced targeted attacks. Important alerts get lost in the noise of unimportant alerts, allowing attacks to breach security.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Jupyter Notebook 100.0%