XTRACTIS FOR cyber security
Log-based Detection of cyber Intrusions
Benchmark vs. Logistic Regression, Random Forests, Boosted Trees & Neural Networks
How to automatically, efficiently and transparently diagnose an intrusion on a computer network from the connection logs?
Identify the characteristics of logs defining a cyber intrusion. Enhance expert knowledge by helping cybersecurity specialists understand the causal relationships between specific log features, their combination, and the existence of an intrusion
Help IT detect cyberattacks as early as possible and understand the underlying strategy of the attacker in order to consider measures to thwart future attacks.
Avoid a large number of false alarms.
We get a Predictive Model that is:
A Decision System composed of 25 unchained gradual rules using only the 26 variables that xtractis identified as significant.
Excellent performance on External Test Dataset #1. Very good on External Test Dataset #2.
Efficient & Operational.
Running in real-time up to 70,000 predictions per second (i7, 8 physical cores, 2.5GHz), offline or online (API).
Use Case 09/2022 (v3.0)
XTRACTIS® GENERATE 12.1.42925 (07/2022)
- Problem Definition
- Xtractis Solution
- Top-Model Induction
- Predictions for 3 cases
- Top-Models Benchmark