CERT-Naval-Group / Dynamic-Attack-Graph-DAGLinks
☆10Updated 2 years ago
Alternatives and similar repositories for Dynamic-Attack-Graph-DAG
Users that are interested in Dynamic-Attack-Graph-DAG are comparing it to the libraries listed below
Sorting:
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆11Updated 2 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆13Updated 2 years ago
- Attack graph construction and analysis☆34Updated 6 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆37Updated 11 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆80Updated 4 months ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Updated last year
- Cyber attack toolchain integrating MulVAL☆9Updated 2 years ago
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Updated 7 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆12Updated 8 months ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆26Updated 3 years ago
- A logic-based enterprise network security analyzer☆124Updated 2 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 7 months ago
- AI-IDS software for Splunk☆17Updated 5 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆71Updated last year
- A curation of awesome papers, datasets and tools about network traffic analysis.☆70Updated 7 months ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆21Updated 3 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆23Updated 8 months ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- 网络流量领域工具库、公开数据集及加密流量解析方法☆71Updated 2 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆40Updated last year
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆45Updated last year
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆73Updated 3 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆50Updated 2 years ago
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆44Updated last year
- Insider threat detection via bert☆20Updated 3 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆34Updated last year
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆80Updated 3 years ago
- Multi-Agent Reinforcement Learning on network-security☆19Updated 3 years ago