FrankHassanabad / suricata-sample-data
Repository of creating different example suricata data sets
☆34Updated 6 years ago
Alternatives and similar repositories for suricata-sample-data:
Users that are interested in suricata-sample-data are comparing it to the libraries listed below
- A completely automated anomaly detector Zeek network flows files (conn.log).☆76Updated 7 months ago
- ☆101Updated 4 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆55Updated 4 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Updated 6 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆119Updated last year
- zeek-scripts☆44Updated 6 years ago
- Mapping NSM rules to MITRE ATT&CK☆70Updated 4 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆35Updated 9 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 8 months ago
- ☆21Updated 3 years ago
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆99Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆86Updated 8 months ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- ☆76Updated last year
- Suricata rules for the new critical vulnerabilities☆81Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆65Updated 5 years ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆149Updated 2 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 4 months ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆28Updated 2 years ago
- DGA Detection with ML and DL☆47Updated 5 years ago
- A logic-based enterprise network security analyzer☆119Updated 2 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆75Updated 7 years ago
- Collection of Snort 2/3 rules.☆35Updated 6 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago