SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-Links
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
Sorting:
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- A collection of resources for security data☆41Updated 7 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 11 months ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- Open platform for modelling, collection and exchange of knowledge☆161Updated 2 months ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 3 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last week
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆45Updated last year
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆37Updated 9 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆79Updated 2 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- Specifications used in the MISP project including MISP core format☆51Updated last week
- Network Forensics Workshop Files☆17Updated 10 years ago
- Content for cyber defense course☆14Updated 10 years ago
- Expert Investigation Guides☆52Updated 4 years ago
- A collection of infosec related scripts and information.☆53Updated 9 months ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- Repository of yara rules☆60Updated 2 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Threat Intelligence distribution☆30Updated 9 years ago