TagsDescriptionIdentify malicious and benign network traffic to demonstrate an understanding of potential security breaches.URL