SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-:
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆70Updated 4 years ago
- ☆21Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Python API for the CVSS v3☆58Updated 3 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- Public Code for ICS Evasion Attack Generation☆42Updated 3 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 2 months ago
- Searches for Insider Threat Hunting☆31Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆76Updated 7 months ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o …☆35Updated 6 years ago
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- ICS TestBed Framework☆65Updated 6 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated 11 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- CARET - A tool for viewing cyber analytic relationships☆54Updated 5 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 7 years ago
- The new name is DeTT&CT☆24Updated 5 years ago