Welcome to NetSecAnalyzer, a data analysis project for detecting DNS tunneling events using Spark and Python.
Project Overview
NetSecAnalyzer analyzes DNS traffic data to identify potential DNS tunneling events. It leverages Apache Spark for scalable data processing and provides functionalities for data exploration, anomaly detection, and trend analysis.
An example of how the data will look like:
Remove all the files from
/data/raw
&&/data/processed
if you are changing any code from/scripts
- JDK should be installed and should be in envoirnment variable path.
- Python and Git should be installed
Getting Started
Open your terminal and clone this repository using the following command:
git clone https://github.com/AmandracOP/NetSecAnalyzer.git
I assume you have not changed my project's file structure. If you changed the location, you will need to update the path in the code:
- You have to change paths in all the files from
/scripts
if you change my directory structure. - If you have not changed my directory structure still you might need to change path(use absolute paths only) in
/notebooks
.
It's recommended to create a virtual environment to isolate project dependencies. Here's an example using venv
:
python -m venv navvenv
source navvenv/bin/activate # For Linux/macOS
navvenv\\Scripts\\activate.bat # For Windows
Activate your virtual environment and install the required packages listed in requirements.txt
:
pip install -r environment/requirements.txt
Note An example of absolute path Absolute Path=/home/navarch/DNS-analysis-datascience/environment/requirements.txt