SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-Links
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆20Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
Sorting:
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- A collection of resources for security data☆41Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 3 weeks ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 4 years ago
- A tool to extract structured cyber information from incident reports.☆80Updated 7 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆37Updated 9 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated last year
- Mapping NSM rules to MITRE ATT&CK☆71Updated 5 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Specifications used in the MISP project including MISP core format☆51Updated last month
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- Open platform for modelling, collection and exchange of knowledge☆162Updated 3 months ago
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- Definition, description and relationship types of MISP objects☆100Updated last month
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last month
- Hunting IOCs all day every day...☆86Updated last year
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated 2 years ago
- Repository of yara rules☆60Updated 2 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- MISP website (hugo-based)☆24Updated last week
- ☆21Updated 3 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20Updated 8 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 5 years ago