SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-:
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- A collection of resources for security data☆41Updated 7 years ago
- intrusion detection☆23Updated 7 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 3 months ago
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆54Updated 7 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- Public Code for ICS Evasion Attack Generation☆42Updated 4 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated 2 months ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Searches for Insider Threat Hunting☆31Updated 5 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Updated 10 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 4 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- ICS TestBed Framework☆65Updated 6 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago