SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-Links
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
Sorting:
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- A collection of resources for security data☆41Updated 7 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- MAS - Modbus Attack Scripts☆10Updated 7 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- Cyber Intel Management☆48Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 10 months ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- Home to the ActorTrackr source code☆29Updated 7 years ago
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- ☆21Updated 3 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Searches for Insider Threat Hunting☆32Updated 6 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆38Updated 9 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20Updated 8 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 6 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 8 years ago
- Public Code for ICS Evasion Attack Generation☆42Updated 4 years ago
- SANS Hunting on the Cheap☆35Updated 9 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago