Translations:UC7 : Suspicious security events detection/5/en
De Wiki Campus Cyber
Results
This section is not really applicable since the current objective is not targeted towards production or POC. Nevertheless, the two models are highlighting the most abnormal IP addresses (and potentially related users). These lists of addresses could be used as input for further investigation by an operational expert.