Skip to content

polarking/ss7-anomaly-detection

Repository files navigation

SS7 Anomaly Detection

Anomaly detection for the SS7 Attack Simulator using the ELK stack, Apache Kafka, and Apache Spark.

This project merge together each component required to run the SS7 Attack Simulator and analysis its generated traffic using Apache Spark.

This project is part of a master thesis currently being done at NTNU Gjøvik, Norway.

Instructions

Clone the project using git:

git clone --recursive https://github.com/polarking/ss7-anomaly-detection

Please see the individual subproject's README.md for how to compile and run each individual project.

  1. Make sure Elasticsearch and Apache Kafka is running on localhost.
  2. Create the Kafka topics ss7-raw-input and ss7-preprocessed,
  3. Start logstash, which reads network traffic on localhost using tshark: logstash -t logstash/tshark-kafka-es.conf
  4. Start the SS7 Attack Simulator following the instructions on the project page.
  5. Start the ss7-ml-preprocess and the ss7-ml-analysis Spark applications following the instructions on the project pages.
  6. After some time, data should start to appear in Elasticsearch.

About

Detecting anomalies in SS7 using Apache Spark

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published