A framework for the Analysis of Intrusion Detection Alerts
☆17Nov 11, 2021Updated 4 years ago
Alternatives and similar repositories for AIDA-Framework
Users that are interested in AIDA-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆28Jul 9, 2025Updated 8 months ago
- The AutoPath pipeline for similarity modeling on heterogeneous networks with automatic path discovery☆11Sep 12, 2019Updated 6 years ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Mar 1, 2019Updated 7 years ago
- ☆12Sep 12, 2020Updated 5 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Jun 28, 2024Updated last year
- Material from the DARPA Transparent Computing Program☆229Apr 29, 2020Updated 5 years ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆19Mar 27, 2023Updated 2 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- tcp pcap to weka☆20Mar 5, 2017Updated 9 years ago
- some tools plugins☆14May 24, 2023Updated 2 years ago
- Code for the paper "Refining Language Model with Compositional Explanation" (NeurIPS 2021)☆11Oct 25, 2021Updated 4 years ago
- Implementation of the DeepLog anomaly detection system☆19Jul 28, 2018Updated 7 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Nov 14, 2019Updated 6 years ago
- Crack any ftp server by using FTP Crack Elite tool kit, ftp bruteforce☆12Nov 7, 2017Updated 8 years ago
- In this small project we will predict the email that in which folder it will go in spam or primary.☆11Jul 5, 2016Updated 9 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- ☆13Jul 26, 2023Updated 2 years ago
- 我的远程连接一键部署工具。☆10May 4, 2023Updated 2 years ago
- ☆22Oct 22, 2024Updated last year
- An adaptive URL online checker for python2 and python3☆10Aug 10, 2018Updated 7 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- ☆21Jul 18, 2024Updated last year
- Repository of creating different example suricata data sets☆36Jan 2, 2019Updated 7 years ago
- ☆39Aug 8, 2024Updated last year
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- A fast implementation of Leiserchess AI for MIT 6.172`16 http://scrimmage.csail.mit.edu/☆12Dec 22, 2016Updated 9 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆175Sep 3, 2022Updated 3 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Jan 24, 2019Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- Python module to use the MISP Taxonomies☆31Feb 19, 2026Updated last month
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Apr 10, 2017Updated 8 years ago
- An easy and efficient tool to build sequential recommendation system utilizing SASRec☆10Nov 1, 2023Updated 2 years ago
- 系统巡检脚本☆12Aug 9, 2016Updated 9 years ago