Category: Data Curation
-
Introducing the IP Range Reputation System: Identify Organized Cyber Crime vs. Petty Criminals
IP Range Reputation provides incident response teams & threat researchers with improved visibility in low-information environments to act fast against threats.
-
Detecting VPN and Proxy Usage via IP Traffic Analysis: A Glimpse into CrowdSec’s Kaggle Challenge
We hosted a Kaggle challenge to tackle the pressing cybersecurity issue of detecting VPN and proxy traffic. Here are the key findings and takeaways.
-
Understanding the Basics of the Bayesian Bucket, How It Works and How to Use It
Bayesian reasoning has applications in cybersecurity and the detection of malicious behavior. Learn how the Bayesian bucket works and how to use it.
-
AI-Powered Proxy and VPN Detection — The CrowdSec Way
Learn how CrowdSec detects VPN and proxies using machine learning models and leveraging attack patterns exposed by IPs to improve detection.