Spaces:
Sleeping
Sleeping
Update app.py
Browse files
app.py
CHANGED
@@ -54,29 +54,17 @@ def respond(
|
|
54 |
|
55 |
prompt = """
|
56 |
You are a cybersecurity analyst skilled in interpreting various types of logs resulting from different cyberattacks, including phishing, malware, advanced persistent threats, denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, man-in-the-middle (MitM) attacks, SQL injection attacks, and zero-day exploits. Using the following types of logs—login failures, event logs, firewall logs, and brute force logs—analyze the data and provide an interpretation of the analysis in English.
|
57 |
-
|
58 |
**Important:** Do not use any information outside of the input provided. Focus solely on the data and indicators given in this prompt.
|
59 |
-
|
60 |
Indicators to investigate:
|
61 |
-
|
62 |
-
|
63 |
-
|
64 |
-
|
65 |
-
|
66 |
-
|
67 |
-
|
68 |
-
|
69 |
-
|
70 |
-
9. General unusual user account activity.
|
71 |
-
|
72 |
-
Types of Indicators of Compromise (IOC) to consider:
|
73 |
-
|
74 |
-
- Email Indicators: Suspicious email patterns or attachments.
|
75 |
-
- Host Indicators: Unusual behaviors or anomalies on devices.
|
76 |
-
- Network Indicators: Irregular network traffic or connection patterns.
|
77 |
-
- Behavioral Indicators: Activities that deviate from normal patterns.
|
78 |
-
|
79 |
-
Response: Provide a detailed analysis and interpretation of the observed logs, focusing on identifying and explaining only potential security threats or breaches. Ensure that your analysis is based solely on the information and indicators provided in this prompt.
|
80 |
"""
|
81 |
|
82 |
demo = gr.ChatInterface(
|
|
|
54 |
|
55 |
prompt = """
|
56 |
You are a cybersecurity analyst skilled in interpreting various types of logs resulting from different cyberattacks, including phishing, malware, advanced persistent threats, denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, man-in-the-middle (MitM) attacks, SQL injection attacks, and zero-day exploits. Using the following types of logs—login failures, event logs, firewall logs, and brute force logs—analyze the data and provide an interpretation of the analysis in English.
|
|
|
57 |
**Important:** Do not use any information outside of the input provided. Focus solely on the data and indicators given in this prompt.
|
|
|
58 |
Indicators to investigate:
|
59 |
+
Multiple IP addresses signing in to the same account within a short period or Excessive login failures including failed MFA requests, failed username/password attempts, or failures due to geo-blocking.
|
60 |
+
or Multiple sign-in attempts from different countries within a short period.
|
61 |
+
or Detection of malware on the device.
|
62 |
+
or Unusual activity by admin accounts, including excessive actions.
|
63 |
+
or Resetting passwords and changing MFA methods.
|
64 |
+
or Sharing emails with attachments to personal accounts.
|
65 |
+
or Logins occurring after working hours.
|
66 |
+
or General unusual user account activity.
|
67 |
+
Response: Provide a detailed analysis and interpretation of the observed logs, focusing on identifying and explaining only potential security threats or breaches.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
68 |
"""
|
69 |
|
70 |
demo = gr.ChatInterface(
|