|
1 | 1 | # Attacker IP Prioritization (AIP) Tool
|
| 2 | +[](https://github.com/stratosphereips/AIP/actions/workflows/python-ci-tests.yml) |
| 3 | +[](https://github.com/stratosphereips/AIP/actions/workflows/github-code-scanning/codeql) |
| 4 | +[](https://github.com/stratosphereips/AIP/actions/workflows/docker-hub.yml) |
| 5 | +[](https://github.com/stratosphereips/AIP/actions/workflows/docker-publish.yml) |
| 6 | + |
| 7 | +[](https://hub.docker.com/r/stratosphereips/aip) |
| 8 | +[](https://github.com/stratosphereips/AIP/issues/) |
| 9 | +[](https://github.com/stratosphereips/AIP/issues?q=is%3Aissue+is%3Aclosed) |
| 10 | +[](https://github.com/stratosphereips/AIP/pulls?q=is%3Aopen) |
| 11 | +[](https://github.com/stratosphereips/AIP/pulls?q=is%3Aclosed) |
| 12 | + |
| 13 | + |
2 | 14 | The Attacker IP Prioritization (AIP) is a tool to generate efficient and economic IP blocklists based on network traffic captured from honeypot networks.
|
3 | 15 |
|
4 | 16 | With the advent of 5G, IoT devices are directly connected often without firewall protection. Therefore we need blocklists that are small, efficient and economic. The AIP structure is shown below.
|
@@ -52,4 +64,4 @@ The Stratosphere AIP tool is licensed under [GNU General Public License v3.0](ht
|
52 | 64 | ## About
|
53 | 65 | This tool was developed at the Stratosphere Laboratory at the Czech Technical University in Prague. This is part of the [Stratosphere blocklist generation project](https://mcfp.felk.cvut.cz/publicDatasets/CTU-AIPP-BlackList/).
|
54 | 66 |
|
55 |
| -This tool was originally born from the bachelor thesis of Thomas O'Hara, [The Attacker IP Prioritizer: An IoT Optimized Blacklisting Algorithm (2021)](https://dspace.cvut.cz/handle/10467/96722). |
| 67 | +This tool was originally born from the bachelor thesis of Thomas O'Hara, [The Attacker IP Prioritizer: An IoT Optimized Blacklisting Algorithm (2021)](https://dspace.cvut.cz/handle/10467/96722). |
0 commit comments