Model and predict network security threats from SisaGuard, a network security Project.
graph TD;
A[Tshark/PyShark Capture] --> B{Traffic Data}
B --> C[Process for Model]
B --> D[Process for JSON/CSV]
C --> E[Model Prediction]
E --> F[Data Prediction to JSON/CSV]
D --> F
F --> G[Rest API]
E --> H[Analysis]
H --> I[Email Report]
G --> J[Dashboard]
-
Temporal and Network Information:
Timestamp
,Source IP Address
,Destination IP Address
,Source Port
, andDestination Port
provide detailed context about each network event, enabling temporal and network-based analysis.
-
Protocol and Type of Traffic:
Protocol
,Packet Length
,Packet Type
, andTraffic Type
(ICMP, UDP, TCP, HTTP, DNS) are critical to understanding the nature of traffic and could be indicative of normal or malicious behavior.
-
Payload Analysis:
- Natural language processing (NLP) techniques are considered to analyze the content of
Payload Data
, looking for known malware signatures or anomalous patterns.
- Natural language processing (NLP) techniques are considered to analyze the content of
-
Features Based on the Protocol:
Protocol
,IP Address
, andPorts
are used as features in the model.
-
Supervised Classification Model:
- Use
Attack Type
orSeverity Level
as labels to train a classification model that can predict the type or severity of attacks based on available features.
- Use