Simulated and detected a stealthy insider threat ‘Alex’, who moved from file snooping to SSH brute-forcing. Includes PCAPs, Zeek logs, NetworkMiner analysis, and a full incident report.
-
Updated
Aug 9, 2025
Simulated and detected a stealthy insider threat ‘Alex’, who moved from file snooping to SSH brute-forcing. Includes PCAPs, Zeek logs, NetworkMiner analysis, and a full incident report.
Hand's on use of Network Security and Traffic Analysis concepts to spot and probe network anomalies using industry tools and techniques.
Add a description, image, and links to the networkminer topic page so that developers can more easily learn about it.
To associate your repository with the networkminer topic, visit your repo's landing page and select "manage topics."