SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
- Utility for parsing Bro log files into CSV or JSON format☆41Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆35Updated 9 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 5 years ago
- ☆28Updated 7 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆53Updated 7 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆20Updated 3 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- A collection of resources for security data☆40Updated 6 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆27Updated 8 years ago
- ☆21Updated 2 years ago
- IOCs for CRASHOVERRIDE malware framework☆25Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- A website and framework for testing NIDS detection☆56Updated 3 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆65Updated 6 months ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆53Updated 6 years ago
- Presentation Slides and Video links☆31Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆74Updated 3 months ago
- Hunting IOCs all day every day...☆83Updated last year
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆45Updated 5 months ago
- ☆33Updated 3 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Specifications used in the MISP project including MISP core format☆46Updated last month
- Cyber Intel Management☆46Updated 6 years ago
- IOC Management and Visualization Tool☆47Updated last year
- Maltese - Malware Traffic Emulator☆26Updated 7 years ago
- Home to the ActorTrackr source code☆27Updated 7 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆77Updated last year