Malicious Traffic

Aim of the Experiment

The aim of this experiment is to analyze and detect malicious network traffic by examining network logs for potential security threats. Users will gain hands-on experience in identifying and differentiating between normal and malicious activity, with a specific focus on detecting SSH brute force attacks hidden within regular traffic and take appropriate measures to investigate and respond to security threats effectively.