Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'
☆19May 12, 2019Updated 6 years ago
Alternatives and similar repositories for graph_alert_correlation
Users that are interested in graph_alert_correlation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆29Jul 9, 2025Updated 9 months ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Repository of creating different example suricata data sets☆36Jan 2, 2019Updated 7 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code for paper "Ranking Causal Anomalies via Temporal and Dynamical Analysis on Vanishing Correlations. Wei Cheng, Kai Zhang, Haifeng Che…☆14Dec 26, 2019Updated 6 years ago
- This is a boilerplate which has dependencies for pyspark(3.3.0) mongo(>4.x) connectivity☆10May 3, 2024Updated last year
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆69Apr 19, 2025Updated 11 months ago
- Interpretation of Isolation Forests☆22Jun 17, 2024Updated last year
- A curated list of research and repositories on the novel technique of hardware fuzzing☆23Mar 26, 2026Updated 2 weeks ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆19Mar 27, 2023Updated 3 years ago
- Supplementary material for KDD 2018 workshop "DCSO: Dynamic Combination of Detector Scores for Outlier Ensembles"☆20Jan 26, 2019Updated 7 years ago
- Non-local Modeling for Image Quality Assessment☆13Dec 20, 2023Updated 2 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Detect duplicated items。内容排重框架。☆11Apr 30, 2015Updated 10 years ago
- 天池比赛☆10Jul 4, 2021Updated 4 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- ☆23Apr 7, 2026Updated last week
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- A span-based joint named entity recognition (NER) and relation extraction model.☆11Aug 5, 2020Updated 5 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Jul 10, 2017Updated 8 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- 2020-natural-language-processing-project☆10Dec 18, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆23Aug 13, 2024Updated last year
- Anomaly Detection in Dynamic Graphs☆32Nov 1, 2023Updated 2 years ago
- A simple CLI command that initialises a Kedro project from an existing Python package☆11Aug 23, 2024Updated last year
- RBAC Auth manager for Yii2☆17Jul 19, 2020Updated 5 years ago
- Web前端加密场景下的参数抓包修改、参数模糊测试工具☆20Jul 22, 2024Updated last year
- ☆13Jun 7, 2021Updated 4 years ago
- ☆11Mar 14, 2023Updated 3 years ago
- ☆17Nov 19, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository contains 4000 vulnerable hardware designs. Currently this is in Jsonl format for directly using it for fine-tuning LLMs. …☆22Mar 25, 2025Updated last year
- ☆12May 6, 2020Updated 5 years ago
- Implementation of the blindbid logic within Zero Knowledge Proofs☆20Sep 15, 2021Updated 4 years ago
- ☆23Jun 22, 2024Updated last year
- Pre-Silicon Hardware Fuzzing Toolkit☆62Aug 18, 2025Updated 7 months ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- Official repository of the paper "Interpretable Anomaly Detection with DIFFI: Depth-based Isolation Forest Feature Importance", M. Carlet…☆30Aug 7, 2024Updated last year