Home
clx
clx
cucim
cudf
cudf-java
cugraph
cuml
cusignal
cuspatial
cuxfilter
dask-cuda
kvikio
libcudf
libcugraph
libcuml
libkvikio
librmm
raft
rapids-cmake
rmm
stable (22.04)
nightly (22.06)
stable (22.04)
legacy (22.02)
Contents:
API Reference
10 minutes to CLX
CLX Workflow
CLX DGA Detection
Getting Started with CLX and Streamz
CLX Asset Classification (Supervised)
Introduction
CLX cyBERT
CLX LODA Anomaly Detection
CLX Periodicity Analysis
CLX Phishing Detection Using cyBERT
CLX Predictive Maintenance
Introduction
clx
»
Welcome to clx’s documentation!
View page source
Welcome to clx’s documentation!
Contents:
API Reference
IP
Features
Analytics
DNS Extractor
Exploratory Data Analysis
Heuristics
OSI (Open Source Integration)
Parsers
Utils
Workflow
I/O
10 minutes to CLX
What are these libraries?
When to use CLX
Log Parsing
Cyber Data Types
TLD Extraction
Machine Learning
Workflows
Open Source Threat Intelligence Integration
CLX Workflow
What is a CLX Workflow?
When to use a CLX Workflow
Workflow I/O Components
Tying it together
Workflow configurations in an external file
CLX DGA Detection
What is DGA Detection?
When to use CLX DGA Detection?
How to train a CLX DGA Detection model
Save a trained model checkpoint
Load a model checkpoint
DGA Inferencing
Conclusion
Getting Started with CLX and Streamz
Build Quickstart Docker Image
Create Docker Container
Run cyBERT Streamz Example on Apache Logs
Run DGA Streamz Example on Sample Domains
Capturing Benchmarks
Steps to Run Workflow with Custom Arguments
CLX Asset Classification (Supervised)
Introduction
Train Asset Classification model
Initialize variables
Save a trained model
AC Inferencing
CLX cyBERT
Introduction
How to train a cyBERT model
Download pre-trained model
Let’s create a cybert instance and load the pre-trained model.
Sample Apache logs as input
cyBERT Inferencing
Conclusion
CLX LODA Anomaly Detection
Introduction
How to train LODA Anomaly Detection model
Evaluate detector
Explanation of anomalies
Conclusion
Reference
CLX Periodicity Analysis
Introduction
How to use CLX Periodicity Detection
How to reconstruct the signal in the time domain
CLX Phishing Detection Using cyBERT
What is Phishing?
How to train a Phishing Detection model
Save a trained model checkpoint
Save a trained model
Load a model
PD Inferencing
Conclusion
CLX Predictive Maintenance
Introduction
How to train a Predictive Maintenance model
Save a trained model checkpoint
Save a trained model
Load a model
PDM Inferencing
Conclusion
Indices and tables
Index
Module Index
Search Page