View Code? Open in Web Editor
NEW
A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.
Home Page: http://limmen.dev/csle/
License: Other
Makefile 0.45%
Shell 0.40%
Dockerfile 0.57%
Python 86.76%
HTML 0.02%
CSS 0.14%
JavaScript 10.41%
C 0.01%
PHP 1.15%
Prolog 0.02%
Batchfile 0.07%
csle's People
csle's Issues
Setup cluster configuration and deployment. One master node with metastore and management system. Several worker nodes.
LDAP, RADIUS, Kerberos, Certificate authority, etc.
To detect brute-force attacks
When running the flask server for long periods of time, it keeps allocating more and more memory.
Install ClamAv as a sensor to collect data
Proxy the Kibana interface through the management interface for viewing logs.
Capture on different interfaces and export to ELK perhaps.
Add linter and static code analysis to the build process both for the JS and PY projects.
E.g. management node, honeypot node, vulnerable node, appserver node, etc.
Using the --storage-opt option. Add the configuration to the metastore.
E.g. OSSEC webserver, SDN topology viewer, Wazuh, Elastic etc.
Add Zeek as a sensor to collect data
Setup an SSH emulator in the management system that is proxyed
Add security onion as a sensor to collect data
Setup integration tests and CI with jenkins