What a great god knows exactly how to use this dataset? I do is network compound attack prediction identification content, using the data because he is a collection of the multi-step attack, I see the paper USES the snort to replay of the data set, but how to operate to generate ids alert log? And snort installation configuration is very complicated, there is no other soft armor can substitute for the function?
CodePudding user response:
You see which paper, is the snort intrusion detection? Snort can't data replay