SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-Links
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
Sorting:
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- ☆21Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- zeek-scripts☆43Updated 6 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- List of default passwords for Industrial Control Systems☆73Updated 8 years ago
- Searches for Insider Threat Hunting☆32Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Network Forensics Workshop Files☆17Updated 10 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆80Updated 10 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 2 weeks ago
- Content for cyber defense course☆14Updated 10 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 5 months ago
- Repository of yara rules☆60Updated 2 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆45Updated last year
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago