[Oisf-users] Detection Algorithms
Bat Finkler
batfinkler at gmail.com
Fri Oct 20 22:25:03 UTC 2017
Thanks Cooper
That's a shame I was looking to compare a few ML algorithms to see which
detects a particular attack vector the best. I was hoping that I could drop
a couple into suricata to work with live data, rather than using a dataset
and something like weka.
Any advice How I might be able to do the above to allow me to work on live
data ?
Cheers
On Fri, 20 Oct 2017 at 10:20 pm, Cooper F. Nelson <cnelson at ucsd.edu> wrote:
> Those are pattern matching, not machine learning algorithms. They are
> functionally equivalent.
>
> I've already looked at a ML approach and it's a hard problem. It will
> probably require a new engine vs. using suricata.
>
> -Coop
>
> On 10/20/2017 2:08 PM, Bat Finkler wrote:
> > Hi All,
> >
> > I would like to investigate and compare the different detection
> > algorithms (b2g, b2gc, b2gm, b3g, wumanber, ac and ac-gfbs) used by
> > Suricata. If possible to play around with these in Python/TensorFlow.
> >
> > Can anyone point me to which files I can find these in
> >
> > Thanks
>
>
> --
> Cooper Nelson
> Network Security Analyst
> UCSD ITS Security Team
> cnelson at ucsd.edu x41042
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20171020/774a63ed/attachment-0002.html>
More information about the Oisf-users
mailing list