SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-:
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Updated 9 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Cyber Threat Intelligence - Toolbox☆50Updated 6 years ago
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- A collection of resources for security data☆40Updated 7 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- open-source intelligence gathering for SIEMs <3☆37Updated 7 years ago
- ☆21Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the BACnet standard building controls protocol☆31Updated 8 months ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 3 weeks ago
- Home to the ActorTrackr source code☆28Updated 7 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆47Updated 6 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 3 weeks ago
- scan-detection policies for bro☆15Updated 2 weeks ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- ☆28Updated 7 years ago
- Hunting IOCs all day every day...☆85Updated last year
- An OpenTAXII Configuration for MISP☆80Updated 2 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago