Machine Learning Review
Review
By the end of this exercise, you should observe the following:
Anomaly Detection Model Status
- The model progresses through Collecting, Building, and Running stages.
- Status shows Running before you begin launching attacks.
Traffic Visibility
- Legitimate traffic appears in the Threat Analytics dashboard as normal traffic with no detections.
- When running ml-mix, with attack mix 30%, both legitimate and malicious requests appear in logs.
Attack Detection
- Malicious requests (SQL Injection, Command Injection, XSS) are detected and flagged in the Attack Logs.
- Log details show attack type, source IP, and parameter field targeted.
Mitigation Actions
- Depending on policy, malicious traffic is either blocked or alerted.
- Blocked events show the relevant action in log details.