What are possible solutions for labeling independent Zeek logs for attacks and exploits?
The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking possible solutions to automatically label network events/sessions based on time and IP addresses of known attacks using Zeek logs. Documentation, potential points of contact…