Canstralian commited on
Commit
efc3836
·
verified ·
1 Parent(s): 9548097

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +9 -6
README.md CHANGED
@@ -37,13 +37,16 @@ The **CySec Known Exploit Analyzer** is a model designed to detect and analyze k
37
  ## Getting Started
38
 
39
  ### Installation
40
- To clone the repository and install necessary dependencies:
 
41
  ```bash
42
  git clone https://huggingface.co/Canstralian/CySec_Known_Exploit_Analyzer
43
  cd CySec_Known_Exploit_Analyzer
44
  pip install -r requirements.txt
45
 
46
- Usage
 
 
47
 
48
  To analyze a network traffic log:
49
 
@@ -59,18 +62,18 @@ Model Inference
59
     •   Input: Network traffic logs in CSV format
60
     •   Output: Classification of potential exploits with confidence scores
61
 
62
- License
63
 
64
  This project is licensed under the MIT License. See the LICENSE.md file for more details.
65
 
66
- Datasets
67
 
68
  The model was trained using the cysec-known-exploit-dataset, which consists of exploit data collected from real-world network traffic.
69
 
70
- Contributing
71
 
72
  We welcome contributions! Please see CONTRIBUTING.md for guidelines.
73
 
74
- Contact
75
 
76
  For any questions or feedback, feel free to open an issue or reach out to [[email protected]].
 
37
  ## Getting Started
38
 
39
  ### Installation
40
+ To clone the repository and install the necessary dependencies:
41
+
42
  ```bash
43
  git clone https://huggingface.co/Canstralian/CySec_Known_Exploit_Analyzer
44
  cd CySec_Known_Exploit_Analyzer
45
  pip install -r requirements.txt
46
 
47
+ ```
48
+
49
+ ### Usage
50
 
51
  To analyze a network traffic log:
52
 
 
62
     •   Input: Network traffic logs in CSV format
63
     •   Output: Classification of potential exploits with confidence scores
64
 
65
+ ## License
66
 
67
  This project is licensed under the MIT License. See the LICENSE.md file for more details.
68
 
69
+ ## Datasets
70
 
71
  The model was trained using the cysec-known-exploit-dataset, which consists of exploit data collected from real-world network traffic.
72
 
73
+ ## Contributing
74
 
75
  We welcome contributions! Please see CONTRIBUTING.md for guidelines.
76
 
77
+ ## Contact
78
 
79
  For any questions or feedback, feel free to open an issue or reach out to [[email protected]].