@@ -194,7 +194,7 @@ <h3 class="text-lg font-semibold flex items-center gap-2">
194194 < span class ="px-2 bg-orange-100 text-orange-800 rounded-full "> UNKNOWN</ span > - URL status is uncertain.
195195 </ li >
196196 < li >
197- < span class ="px-2 bg-gray-100 text-gray-800 rounded-full "> UNDER REVIEW</ span > - Investigation is ongoing. (Not in use)
197+ < span class ="px-2 bg-gray-100 text-gray-800 rounded-full "> UNDER REVIEW</ span > - Investigation is ongoing.
198198 </ li >
199199 </ ul >
200200 </ div >
@@ -208,85 +208,97 @@ <h3 class="text-lg font-semibold flex items-center gap-2">
208208 < b > Charts provide a visual representation of attack patterns.</ b >
209209 </ li >
210210 < li >
211- < span class ="font-medium "> Attack Methods:</ span > Breakdown of attack techniques used.
211+ < span class ="font-medium "> Attack Methods Distribution :</ span > Breakdown of techniques used by attackers .
212212 </ li >
213213 < li >
214214 < span class ="font-medium "> Attacks Over Time:</ span > Historical trend analysis of attack frequency.
215215 </ li >
216216 < li >
217- < span class ="font-medium "> Targeted Platforms :</ span > Most affected applications and services .
217+ < span class ="font-medium "> Attack Surfaces :</ span > Platforms and applications targeted by attacks .
218218 </ li >
219219 < li >
220- < span class ="font-medium "> Behavior Types:</ span > Classification of common malicious behaviors.
220+ < span class ="font-medium "> Suspected Regions of Origin:</ span > Geographical sources of attacks.
221+ </ li >
222+ < li >
223+ < span class ="font-medium "> Behaviour Types Distribution:</ span > Classification of malicious behaviors.
221224 </ li >
222225 </ ul >
223226 </ div >
224- <!-- URL Status Definitions -->
227+ <!-- Additional Charts Definitions -->
225228 < div >
226229 < p class ="font-medium mb-2 text-indigo-600 ">
227- < b > URL Status Comparison :</ b >
230+ < b > Additional Charts :</ b >
228231 </ p >
229232 < ul class ="space-y-2 ">
230233 < li >
231- < b > Comparison of URL threat statuses based on detected risks .</ b >
234+ < b > These charts provide deeper insights into attack characteristics .</ b >
232235 </ li >
233236 < li >
234- < span class ="font-medium "> Attack Goals :</ span > Intent behind identified cyber threats .
237+ < span class ="font-medium "> URL Status Comparison :</ span > Distribution of URL threat statuses .
235238 </ li >
236239 < li >
237- < span class ="font-medium "> Compromised Accounts :</ span > Categorization of affected accounts .
240+ < span class ="font-medium "> Attack Goal Distribution :</ span > Objectives behind identified threats .
238241 </ li >
239242 < li >
240- < span class ="font-medium "> Method vs. Goal :</ span > Relationship between attack type and objective .
243+ < span class ="font-medium "> Compromised Account Status :</ span > Current state of affected accounts .
241244 </ li >
242245 < li >
243- < span class ="font-medium "> Resolution Status:</ span > Final determination of detected URLs.
246+ < span class ="font-medium "> Method vs Goal Matrix:</ span > Relationship between attack methods and objectives.
247+ </ li >
248+ < li >
249+ < span class ="font-medium "> Attack Vectors Analysis:</ span > Entry points exploited by attackers.
244250 </ li >
245251 </ ul >
246252 </ div >
247- <!-- Database Field Definitions -->
253+ <!-- Data Table Information -->
248254 < div >
249255 < p class ="font-medium mb-2 text-indigo-600 ">
250- < b > Database Fields Overview :</ b >
256+ < b > Detailed Data Table :</ b >
251257 </ p >
252258 < ul class ="space-y-2 ">
253259 < li >
254- < b > Database fields store detailed records of detected threats .</ b >
260+ < b > The table provides comprehensive records of individual cases .</ b >
255261 </ li >
256262 < li >
257- < span class ="font-medium "> DISCORD_ID :</ span > Unique identifier for the compromised user .
263+ < span class ="font-medium "> Found On :</ span > Date when the threat was identified .
258264 </ li >
259265 < li >
260- < span class ="font-medium "> USERNAME :</ span > Name associated with the detected account .
266+ < span class ="font-medium "> Username :</ span > Affected user's display name .
261267 </ li >
262268 < li >
263- < span class ="font-medium "> ATTACK_METHOD :</ span > Technique used for account compromise.
269+ < span class ="font-medium "> Attack Method :</ span > Technique used in the compromise.
264270 </ li >
265271 < li >
266- < span class ="font-medium "> ATTACK_GOAL:</ span > Purpose behind the attack, such as credential theft.
272+ < span class ="font-medium "> Target:</ span > Platform or service being targeted.
273+ </ li >
274+ < li >
275+ < span class ="font-medium "> Status:</ span > Current threat status (Active/Inactive/Unknown).
267276 </ li >
268277 </ ul >
269278 </ div >
270- <!-- Technical Definitions -->
279+ <!-- Usage and Features -->
271280 < div >
272- < p class ="font-large mb-2 text-indigo-600 ">
273- < b > Technical Details :</ b >
281+ < p class ="font-medium mb-2 text-indigo-600 ">
282+ < b > Dashboard Features :</ b >
274283 </ p >
275284 < ul class ="space-y-2 ">
276285 < li >
277- < b > Detailed description of the technologies and protocols involved in the attack analysis.</ b >
286+ < b > The dashboard offers several interactive features to analyze the data.</ b >
287+ </ li >
288+ < li >
289+ < span class ="font-medium "> Search:</ span > Find specific entries by username, behavior, or attack method.
278290 </ li >
279291 < li >
280- < span class ="font-medium "> Malware Signature :</ span > Unique identifiers for malicious files or software .
292+ < span class ="font-medium "> Filters :</ span > Narrow results by attack method or date range .
281293 </ li >
282294 < li >
283- < span class ="font-medium "> IP Addresses :</ span > Identified malicious IP addresses involved in the attack .
295+ < span class ="font-medium "> Interactive Charts :</ span > Click datapoints to switch views or hover for details .
284296 </ li >
285297 < li >
286- < span class ="font-medium "> Network Protocols :</ span > Communication protocols used in the attack .
298+ < span class ="font-medium "> Export Data :</ span > Download the filtered results as a CSV file .
287299 </ li >
288300 < li >
289- < span class ="font-medium "> Geolocation Data :</ span > Physical location of identified attack sources .
301+ < span class ="font-medium "> Detailed View :</ span > Click on table actions to see comprehensive case details .
290302 </ li >
291303 </ ul >
292304 </ div >
0 commit comments