SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-Links
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
Sorting:
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆50Updated 6 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 7 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆69Updated last month
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 4 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 5 months ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Updated 10 years ago
- intrusion detection☆24Updated 8 years ago
- A collection of resources for security data☆41Updated 8 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- Specifications used in the MISP project including MISP core format☆52Updated 3 weeks ago
- Mapping NSM rules to MITRE ATT&CK☆73Updated 5 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 8 years ago
- Open platform for modelling, collection and exchange of knowledge☆162Updated 7 months ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Structured Threat Intelligence Graph☆97Updated this week
- Very basic CLI SIEM (Security Information and Event Management system).☆40Updated 7 years ago
- An anomaly-based intrusion detection system.☆85Updated 3 years ago
- Cyber Threat Intelligence Feeds☆69Updated last year
- This program exports MITRE ATT&CK framework in ELK dashboard☆80Updated 3 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆156Updated 6 months ago
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆34Updated this week
- Best practices in threat intelligence☆49Updated 3 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Updated 6 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Updated 2 years ago