SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-Links
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
Sorting:
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated this week
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 3 months ago
- Cyber Threat Intelligence - Toolbox☆51Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- intrusion detection☆24Updated 8 years ago
- Specifications used in the MISP project including MISP core format☆52Updated last week
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 3 months ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- Definition, description and relationship types of MISP objects☆102Updated this week
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- An anomaly-based intrusion detection system.☆86Updated 2 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆37Updated 10 years ago
- Open platform for modelling, collection and exchange of knowledge☆162Updated 5 months ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46Updated last year
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- Hunting IOCs all day every day...☆86Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- Public Code for ICS Evasion Attack Generation☆43Updated 4 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- Structured Threat Intelligence Graph☆97Updated 2 weeks ago
- Repository of yara rules☆60Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago