Added labels to Readme
Browse files
README.md
CHANGED
|
@@ -26,6 +26,34 @@ It achieves the following results on the evaluation set:
|
|
| 26 |
|
| 27 |
This model is meant for text classification of log files for network intrusion detection. The python package that runs this model can be found here -> https://github.com/Isaacwilliam4/INSyT.
|
| 28 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 29 |
### Training hyperparameters
|
| 30 |
|
| 31 |
The following hyperparameters were used during training:
|
|
|
|
| 26 |
|
| 27 |
This model is meant for text classification of log files for network intrusion detection. The python package that runs this model can be found here -> https://github.com/Isaacwilliam4/INSyT.
|
| 28 |
|
| 29 |
+
## Labels
|
| 30 |
+
| Label | Label Name |
|
| 31 |
+
|-------|---------------------------------------------------------------------|
|
| 32 |
+
| 0 | attacker:dnsteal:dnsteal-dropped |
|
| 33 |
+
| 1 | attacker:dnsteal:dnsteal-received |
|
| 34 |
+
| 2 | attacker:dnsteal:exfiltration-service |
|
| 35 |
+
| 3 | attacker_change_user:escalate |
|
| 36 |
+
| 4 | attacker_change_user:escalate:escalated_command:escalated_sudo_command |
|
| 37 |
+
| 5 | attacker_http:dirb:foothold |
|
| 38 |
+
| 6 | attacker_http:foothold:service_scan |
|
| 39 |
+
| 7 | attacker_http:foothold:webshell_cmd |
|
| 40 |
+
| 8 | attacker_http:foothold:webshell_upload |
|
| 41 |
+
| 9 | attacker_http:foothold:wpscan |
|
| 42 |
+
| 10 | attacker_vpn:escalate |
|
| 43 |
+
| 11 | attacker_vpn:foothold |
|
| 44 |
+
| 12 | benign |
|
| 45 |
+
| 13 | crack_passwords:escalate |
|
| 46 |
+
| 14 | dirb:foothold |
|
| 47 |
+
| 15 | dns_scan:foothold |
|
| 48 |
+
| 16 | escalate:escalated_command:escalated_sudo_command |
|
| 49 |
+
| 17 | escalate:escalated_command:escalated_sudo_command:escalated_sudo_session |
|
| 50 |
+
| 18 | escalate:webshell_cmd |
|
| 51 |
+
| 19 | foothold:network_scan |
|
| 52 |
+
| 20 | foothold:service_scan |
|
| 53 |
+
| 21 | foothold:traceroute |
|
| 54 |
+
| 22 | foothold:wpscan |
|
| 55 |
+
|
| 56 |
+
|
| 57 |
### Training hyperparameters
|
| 58 |
|
| 59 |
The following hyperparameters were used during training:
|