PritomDas / Cyber-Attack-Attribution-with-Machine-Learning
Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attribution becomes more valuable. The process of cyber attack attribution can be done using reverse engineering. From the metadata of the malware executable f…
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cyber-Attack-Attribution-with-Machine-Learning
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- malicious PowerShell script detection model☆36Updated 3 years ago
- Automated Yara Rule generation using Biclustering☆59Updated 3 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated last month
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆11Updated 3 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- ☆18Updated 3 years ago
- ☆14Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆14Updated 5 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆39Updated 3 weeks ago
- ☆16Updated 6 years ago
- Botnet Simulation Framework☆75Updated 4 years ago
- IoT Security Reading List☆62Updated 4 years ago
- The Tangled Genealogy of IoT Malware☆10Updated 3 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- ☆73Updated last year
- ☆24Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆115Updated 11 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆19Updated last year
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆13Updated last year
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆18Updated 9 months ago
- ☆30Updated 4 months ago
- ☆13Updated last year
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆51Updated 9 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆30Updated last year