The user interface is hosted on port 80 of your Spherical Defense deployment, which means you can access it from your browser by simply entering the address of the server in your browser.
The application is easy to use, and provides information about the running system and also the API requests that is has analysed.
This task is shown with tick if sufficient traffic has been ingested to begin training.
This task is shown with a tick if the pre-training processing has completed.
This task is shown with a tick if the system is current training a security model.
This task is shown with a tick if at least one security model has been trained, and new requests are being evaluated.
The number of requests that have been received and are being incorporated for training subsequent models.
The number of security models that have been trained. The one with the highest detection accuracy is preserved for evaluation.
The estimated detection accuracy of the best available model.
The number of security events that have been received.
How anomalous this event is.
This ranges between 100 (very anomalous) and 0 (only slightly anomalous).
When the event occurred.
The part of the request which triggered the event.
Show the entirety of the request.