Glossary

Definitions of terms used in DefenSys and network security.

A

  • Anomaly Score – A numeric value from the ML model. Lower (more negative) = more anomalous. Isolation Forest uses negative scores.
  • Anomaly Detection – Identifying behavior that deviates from normal patterns, often used for unknown or zero-day threats.

B

  • Baseline – A learned profile of "normal" traffic. DefenSys learns over a 7-day period.
  • Brute Force – Repeated login attempts (e.g. SSH, RDP) to guess credentials.

D

  • Detection Engine – The component that analyzes packets and decides if an alert should be raised.

F

  • Feature Vector – A fixed-length array of numbers (e.g. 20 values) used as input to the ML model.
  • Flow – A bidirectional connection between two endpoints (src:port ↔ dst:port, protocol). Used for feature extraction.

H

  • Honeypot – A fake service designed to attract attackers. Any interaction is a confirmed threat.
  • Honey Token – A decoy credential or file placed to detect misuse.

I

  • IDS – Intrusion Detection System. Monitors traffic and detects threats; does not block by default.
  • IPS – Intrusion Prevention System. Can block traffic in addition to detection.
  • Isolation Forest – An ML algorithm that uses random trees to identify anomalies. Anomalies are "easy to isolate."

M

  • ML – Machine Learning. In DefenSys, used for anomaly detection.

P

  • Packet Capture – Capturing network packets for analysis. Requires Npcap (Windows) or libpcap (Linux/macOS).
  • Port Scanning – Probing multiple ports on a host to discover services. Often reconnaissance before an attack.

S

  • SYN Flood – A DoS attack that sends many SYN packets without completing the TCP handshake.
  • Signature-Based Detection – Detection using known patterns (rules, regex). Good for known threats.

T

  • Threat Map – Geographic visualization of threat sources.