Webhawk/Catch helps automatically finding web attack traces in logs
-
Updated
Apr 19, 2024 - Python
Webhawk/Catch helps automatically finding web attack traces in logs
Django middleware and signals for handling security events
Shaley-Sand Log Analysis Tutorial using Waxman-Smits and Dual-Water
A cybersecurity solution that leverages the power of artificial intelligence and machine learning to accurately classify incoming network traffic based on the tactics employed by potential attackers. The system is trained using data gathered from a Cowrie honeypot deployed in the cloud.
A python script to search a file for the user input | Return the previous, current and next line of the searched input | Write the current line into a new file
A paper list of awesome research on load balancing monitoring data analysis, log analysis, decision scheduling, and AIOps.
Kubernetes configurations for deploying Elasticsearch and Kibana. Simplify log analysis with this scalable and efficient setup.
Estimating formation total porosity using Archie's Equation
Smart dashboard developed in MS Power BI to analyze and monitor logs of a specific bank department
A tool designed for rapid CSV file processing and filtering, specifically designed for log analysis.
A Java-based application designed to streamline the process of filtering and analyzing server logs efficiently from MongoDB
"GuardianEye ππ: Empowering Cybersecurity with Advanced Keylogger β A robust defense system providing comprehensive monitoring of employee activities, capturing keystrokes, screenshots, application logs, and system logs for proactive threat detection and enhanced security insights in modern business operations. π‘οΈπ»
Add a description, image, and links to the loganalysis topic page so that developers can more easily learn about it.
To associate your repository with the loganalysis topic, visit your repo's landing page and select "manage topics."