Skip to content

Latest commit

 

History

History
17 lines (10 loc) · 1.41 KB

File metadata and controls

17 lines (10 loc) · 1.41 KB

Chapter 8: Rule-Based Anomaly Detection

This chapter covers simulating data and applying everything learned in chapters 1-6 to catching hackers attempting to authenticate to a website, using rule-based strategies for anomaly detection.

Content

After discussing how to build the login_attempt_simulator package, we will build the simulate.py script for running the simulation. The simulation will generate the files in the logs/ and user_data/ directories. Then, we will use the simulated data in the logs/ directory to conduct our analysis in the anomaly_detection.ipynb notebook.

All of the aforementioned files are provided in this directory:

The end-of-chapter exercises will use the simulate.py script to generate a new dataset; solutions to these exercises can be found in the repository's solutions/ch_08/ directory.