Spaces:
Running
Running
| title: C2Sentinel | |
| emoji: 🛡️ | |
| colorFrom: red | |
| colorTo: gray | |
| sdk: docker | |
| pinned: false | |
| license: mit | |
| models: | |
| - danielostrow/c2sentinel | |
| # C2Sentinel Demo | |
| Interactive demo for C2Sentinel - a machine learning model for detecting Command and Control (C2) beacon communications in network traffic. | |
| ## Features | |
| - Analyze network connection patterns for C2 activity | |
| - Preset examples for common scenarios (C2 beacons, legitimate traffic) | |
| - Adjustable detection threshold | |
| - Detailed risk factor analysis | |
| ## Usage | |
| 1. Paste connection data as JSON or select a preset example | |
| 2. Adjust the detection threshold if needed | |
| 3. Click "Analyze" to run the model | |
| ## Model | |
| See the [C2Sentinel model repository](https://huggingface.co/danielostrow/c2sentinel) for full documentation. | |
| **Author:** Daniel Ostrow | [neuralintellect.com](https://neuralintellect.com) | |