[Oisf-users] Detection Algorithms

Bat Finkler batfinkler at gmail.com
Fri Oct 20 22:25:03 UTC 2017

Thanks Cooper

That's a shame I was looking to compare a few ML algorithms to see which
detects a particular attack vector the best. I was hoping that I could drop
a couple into suricata to work with live data, rather than using a dataset
and something like weka.

Any advice How I might be able to do the above to allow me to work on live
data ?


On Fri, 20 Oct 2017 at 10:20 pm, Cooper F. Nelson <cnelson at ucsd.edu> wrote:

> Those are pattern matching, not machine learning algorithms.  They are
> functionally equivalent.
> I've already looked at a ML approach and it's a hard problem.  It will
> probably require a new engine vs. using suricata.
> -Coop
> On 10/20/2017 2:08 PM, Bat Finkler wrote:
> > Hi All,
> >
> > I would like to investigate and compare the different detection
> > algorithms  (b2g, b2gc, b2gm, b3g, wumanber, ac and ac-gfbs) used by
> > Suricata. If possible to play around with these in Python/TensorFlow.
> >
> > Can anyone point me to which files I can find these in
> >
> > Thanks
> --
> Cooper Nelson
> Network Security Analyst
> UCSD ITS Security Team
> cnelson at ucsd.edu x41042
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20171020/774a63ed/attachment-0002.html>

More information about the Oisf-users mailing list