Skip to content

Instantly share code, notes, and snippets.

@BastinRobin
Last active August 29, 2022 10:39
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save BastinRobin/60f24dc16e655033f251f3729ddd0535 to your computer and use it in GitHub Desktop.
Save BastinRobin/60f24dc16e655033f251f3729ddd0535 to your computer and use it in GitHub Desktop.
HandOn - Cyber Security For Managers - B1

We have been provided with the dataset from XYZ Labs Network Intrusion Logs, Our network protection classifier was able to detect Anamoly vs Normal requests. But as a cyber security expert, your duty is to find out the following details.

  • Which services has highest anamoly detected.
  • Which protocal has highest anamoly detected
  • How many private services had anamoly and which type of protocol used.
  • Does total request counts has any correlation with anamoly.
  • Which are most important variables which contributes to an anamoly.

Download Dataset: https://drive.google.com/file/d/1LaUPgQfqyetu9vgDcMqBFFou5lLlC_ro/view?usp=sharing

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment