A Network Honeypot that utilizes Machine Learning to classify attacks based on the tactic being employed by the attacker.
Below is a table of threats classified by the machine leaning algorithm (LSTM). Click on "More Info" to learn more about the IP address, the attackers tactics and mitigation techniques.
{{step.content}}
{{ step.message }}
{{ step.error }}
Source IP | Commands | Tactic | Action |
---|---|---|---|
{{ row.src_ip }} | {{ row.Commands }} | {{ row.predicted_tactic }} | More Info |
Tactic | {{ selectedIP[0].tactic}} |
---|---|
Command | {{ selectedIP[0].command}} |
Tactic | {{ selectedIP[0].tactic}} |
IP Reputation | {{ selectedIP[0].reputation}} |
Country | {{ selectedIP[0].country}} |
ISP | {{ selectedIP[0].isp}} |
Mitigation | {{ selectedIP[0].mitigation}} |