-
We want a script for deployment to harden the server. We talked about setting up a firewall, and possibly installing an intrusion detection system. Were there other things? Do we need other things?
-
hello @dimtics ,
i am currently writing my Bachelorthesis about Intrusion Detection implement with Machine learning Algorithms. Could I have your permission to use this code? I would also indirectl…
-
Many of the exist intrusion detection neural networks were recurrent in order to account for the time field. We need to modify our existing network so that it is recurrent or determine if a recurrent …
-
Hello, what happen if victim mashine only can using outgoing port 443 and 80 ? And did it using ssh ? What happen if intrusion detection system is enabled? They will see your service?
-
**uhg******
-
I have been watching this project and read the paper"Learning Latent Distribution for Distinguishing Network Traffic in Intrusion Detection System".I have been trying to implement the code.Look forwar…
-
```
What steps will reproduce the problem?
1.
2.
3.
What is the expected output? What do you see instead?
What version of the product are you using? On what operating system?
Please provide any a…
-
```
root@server:~# ipmitool sel elist
1 | 01/15/2017 | 15:27:10 | Physical Security Chassis Intru | General Chassis intrusion () | Asserted
2 | 01/16/2017 | 15:04:48 | Physical Security Chas…
-
对于dataPreprocessing部分流量分割的代码,其中有一段是导入flow_indx.json文件,但是不知道您如何设置这个flow_indx.json文件;此外,对于代码中的导入数据部分,作者您选择导入的数据,是根据什么来选择的呢?
-
I am trying to understand the differences between Falco and tetragon. Let’s say, falco is meant for this and it cannot do this like tetragon. Can I get some help? Kindly try to provide elaborate answe…