DigitalTwinSocCyberRange / DigitalTwinCyberrange
DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide training for SOC analysts in a highly realistic scenario making use of the simulation component of the digital twin of an industrial filling plant.
☆7Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for DigitalTwinCyberrange
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆24Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 2 years ago
- A set of PCAPs used to test the parsers used by Malcolm. Also, a curated list of PCAP collections I've found online.☆32Updated this week
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 2 years ago
- ☆19Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 6 months ago
- Public Code for ICS Evasion Attack Generation☆40Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆37Updated 4 months ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆63Updated 5 months ago
- ☆21Updated 10 months ago
- Cyber Range Automated Construction Kit☆13Updated 4 years ago
- Malware Detection using Machine Learning (MDML)☆47Updated last year
- A purple team oriented cyber range deployed in AWS with Terraform☆12Updated 4 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆35Updated 3 weeks ago
- Collection of resources for Industrial control system cybersecurity☆15Updated 2 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆18Updated 9 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆20Updated 3 years ago
- Import Mitre Att&ck into Neo4j database☆33Updated last year
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆36Updated 4 years ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆27Updated 2 years ago
- ☆17Updated 8 months ago
- Zeek Modbus Extension Scripts - CISA ICSNPP☆11Updated 4 months ago
- An anomaly-based intrusion detection system.☆80Updated last year
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆19Updated this week
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆30Updated 5 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- ☆29Updated 8 months ago
- A document tagging library☆29Updated last year