SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-:
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆37Updated 9 years ago
- ☆21Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- Specifications used in the MISP project including MISP core format☆51Updated last month
- intrusion detection☆23Updated 7 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Presentation Slides and Video links☆32Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Repository of yara rules☆59Updated 2 years ago
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- List of default passwords for Industrial Control Systems☆72Updated 8 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 6 years ago
- Expert Investigation Guides☆51Updated 3 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 6 months ago