+In addition there is a clustering feature, which groups similar command sequences together, allowing for a "fuzzy" search using the 'include_similar' query parameter. If this parameter is used, the result will also contain IP addresses that executed similar command to the one requested. In my testing, this feature allowed me to attribute more than 2000 IP addresses to the 'mdrfckr' botnet on my personal instance of GreedyBear. On the Honeynet instance, the clustering feature is currently not activated, as it is very resource hungry. I'll try to make it more efficient soon(ish). :)
0 commit comments