Code Monkey home page Code Monkey logo

autonomous-threat-hunting's Introduction

Autonomous-Threat-Hunting

The goal of this software is to detect threats within captured pcap files. The software can be loaded onto a host to perform these functions on medium to small sized pcap files for analysis. An administrator can view the records of tests, recognize blacklisted IP’s that have previously been identified, and edit records, targeted IP’s, as well as modify administrator access.

Getting Started

These instructions will get you a copy of the project up and running on your local machine for development and testing purposes.

Prerequisites

Following is a list of prerequisite libraries employed in the project:

  • sklearn
  • numpy
  • pyshark
  • prettytable
  • pyfiglet

To install these libraries onto your machine, we recommend using pip3. For example, the command:

pip3 install sklearn

Will install the sklearn library to your machine. No further action is required to complete installation.

Installing

A step by step series of examples that tell you how to get a copy of the project running on your machine.

Get Code

Obtain a copy of all code contained here either by cloning this repository to your machine or by downloading a compressed folder containing all project files and placing it where you would like the code to run.

To clone the repository, run: git clone https://github.com/JPsquared/Autonomous-Threat-Hunting.git

Run the Program

To run the program, execute the following line of code in a terminal:

python3 ath.py

Introductory information will be displayed, then the screen will then give you choices for 1, testing, or 2, system admin. Option 3 will exit the program.

After selecting 1, you will be presented to choose a module to examine and test a pcap on. Follow number choices in order to determine how you want to test.

You can also choose system admin. You will need to input a username and password.

  • INITIAL USERNAME: USNA
  • INITIAL PASSWORD: 2021

Once access has been gained, you can view/edit, records, admins, and the IP blacklist.

Authors

  • Sean Bowman - Group Leader
  • Matt Ransom
  • Ethan Dupre
  • Brody Jenkins
  • John Paul Post

File Descriptions

System Admin Files

  • viewRec.py - allows user to records of tests
  • editRec.py - editing records
  • viewAdmin.py - viewing admin passwords and usernames
  • editAdmin.py - editing admin access
  • viewBL.py - viewing blacklisted IPs
  • editBL.py - editing blacklisted IPs

Testing Files

  • timing.py - used for determining interpacket spacing of packets
  • IPAA.py- feature extraction for port access attempts
  • testing.py - used for selection of features, and general analytics

Learning Files

  • learning.py - used to create a classifier model that will determine threatening behavior

autonomous-threat-hunting's People

Contributors

jpsquared avatar

Watchers

James Cloos avatar  avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.