<div><div dir="auto">Thanks Cooper</div></div><div dir="auto"><br></div><div dir="auto">That's a shame I was looking to compare a few ML algorithms to see which detects a particular attack vector the best. I was hoping that I could drop a couple into suricata to work with live data, rather than using a dataset and something like weka.</div><div dir="auto"><br></div><div dir="auto">Any advice How I might be able to do the above to allow me to work on live data ?</div><div dir="auto"><br></div><div dir="auto">Cheers</div><div dir="auto"><br></div><div dir="auto"><br></div><div><br><div class="gmail_quote"><div>On Fri, 20 Oct 2017 at 10:20 pm, Cooper F. Nelson <<a href="mailto:cnelson@ucsd.edu">cnelson@ucsd.edu</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Those are pattern matching, not machine learning algorithms. They are<br>
functionally equivalent.<br>
<br>
I've already looked at a ML approach and it's a hard problem. It will<br>
probably require a new engine vs. using suricata. <br>
<br>
-Coop<br>
<br>
On 10/20/2017 2:08 PM, Bat Finkler wrote:<br>
> Hi All,<br>
><br>
> I would like to investigate and compare the different detection<br>
> algorithms (b2g, b2gc, b2gm, b3g, wumanber, ac and ac-gfbs) used by<br>
> Suricata. If possible to play around with these in Python/TensorFlow.<br>
><br>
> Can anyone point me to which files I can find these in<br>
><br>
> Thanks<br>
<br>
<br>
--<br>
Cooper Nelson<br>
Network Security Analyst<br>
UCSD ITS Security Team<br>
<a href="mailto:cnelson@ucsd.edu" target="_blank">cnelson@ucsd.edu</a> x41042<br>
<br>
<br>
</blockquote></div></div>