cyberattacks
Difficult to know what's going on with more and more connected IoT. CSL observes the behavior and communications to detect anomalies and prevent unwanted consequences
Detection is based on a model of normal behavior. Building it is error prone, so CSL relies on a specific learning algorithm able to capture the system behavior
User made rules can also be included.
Independant agents listen and observe the system without disturbing it.
They can be managed via a web interface and use an independant network. Alerts can be sent using various protocols.