Update README.md
Browse files
README.md
CHANGED
|
@@ -37,13 +37,16 @@ The **CySec Known Exploit Analyzer** is a model designed to detect and analyze k
|
|
| 37 |
## Getting Started
|
| 38 |
|
| 39 |
### Installation
|
| 40 |
-
To clone the repository and install necessary dependencies:
|
|
|
|
| 41 |
```bash
|
| 42 |
git clone https://huggingface.co/Canstralian/CySec_Known_Exploit_Analyzer
|
| 43 |
cd CySec_Known_Exploit_Analyzer
|
| 44 |
pip install -r requirements.txt
|
| 45 |
|
| 46 |
-
|
|
|
|
|
|
|
| 47 |
|
| 48 |
To analyze a network traffic log:
|
| 49 |
|
|
@@ -59,18 +62,18 @@ Model Inference
|
|
| 59 |
• Input: Network traffic logs in CSV format
|
| 60 |
• Output: Classification of potential exploits with confidence scores
|
| 61 |
|
| 62 |
-
License
|
| 63 |
|
| 64 |
This project is licensed under the MIT License. See the LICENSE.md file for more details.
|
| 65 |
|
| 66 |
-
Datasets
|
| 67 |
|
| 68 |
The model was trained using the cysec-known-exploit-dataset, which consists of exploit data collected from real-world network traffic.
|
| 69 |
|
| 70 |
-
Contributing
|
| 71 |
|
| 72 |
We welcome contributions! Please see CONTRIBUTING.md for guidelines.
|
| 73 |
|
| 74 |
-
Contact
|
| 75 |
|
| 76 |
For any questions or feedback, feel free to open an issue or reach out to [[email protected]].
|
|
|
|
| 37 |
## Getting Started
|
| 38 |
|
| 39 |
### Installation
|
| 40 |
+
To clone the repository and install the necessary dependencies:
|
| 41 |
+
|
| 42 |
```bash
|
| 43 |
git clone https://huggingface.co/Canstralian/CySec_Known_Exploit_Analyzer
|
| 44 |
cd CySec_Known_Exploit_Analyzer
|
| 45 |
pip install -r requirements.txt
|
| 46 |
|
| 47 |
+
```
|
| 48 |
+
|
| 49 |
+
### Usage
|
| 50 |
|
| 51 |
To analyze a network traffic log:
|
| 52 |
|
|
|
|
| 62 |
• Input: Network traffic logs in CSV format
|
| 63 |
• Output: Classification of potential exploits with confidence scores
|
| 64 |
|
| 65 |
+
## License
|
| 66 |
|
| 67 |
This project is licensed under the MIT License. See the LICENSE.md file for more details.
|
| 68 |
|
| 69 |
+
## Datasets
|
| 70 |
|
| 71 |
The model was trained using the cysec-known-exploit-dataset, which consists of exploit data collected from real-world network traffic.
|
| 72 |
|
| 73 |
+
## Contributing
|
| 74 |
|
| 75 |
We welcome contributions! Please see CONTRIBUTING.md for guidelines.
|
| 76 |
|
| 77 |
+
## Contact
|
| 78 |
|
| 79 |
For any questions or feedback, feel free to open an issue or reach out to [[email protected]].
|