This project aims to improve the way System Administrators detect Security Flaw Patterns in their Firewall Connection Logs, by making easy to visualize this logs filtered by services or countries.
These instructions will get you a copy of the project up and running on your local machine for development and testing purposes. See deployment for notes on how to deploy the project on a live system.
To use this project the following R packages are needed:
- shiny
- dplyr
- leaflet
- DT
You can do it at once running the following command:
install.packages(c("shiny","dplyr","leaflet","DT"))
- Carles Llobet - Initial work - Github
- Aleix Hernandez - Initial work - Github
- Diego Martin - Initial work - Github
- Luis Roberto - Initial work - Github
See also the list of contributors who participated in this project.
- Project inspired by https://github.com/rstudio/shiny-examples/tree/master/063-superzip-example