SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆20Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
Sorting:
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆32Updated 7 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆38Updated 9 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆78Updated 9 months ago
- intrusion detection☆24Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- collection of bro and bash scripts that when run from the same directory on Linux distro with bro installed, will pull information such a…☆12Updated 9 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20Updated 8 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- A collection of infosec related scripts and information.☆53Updated 7 months ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- Mass static malware analysis tool☆95Updated 3 years ago
- scan-detection policies for bro☆16Updated 4 months ago
- ☆21Updated 3 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated 4 months ago