Research Article

BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks

Figure 1

Network topology for generating exploit traffic. Attacker VM running Metasploit and target VMs are placed in different network connected by a router. This router is used to capture all traffic from these virtual machines.