SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-Links
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆19Updated 7 years ago
Alternatives and similar repositories for Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
Users that are interested in Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security- are comparing it to the libraries listed below
Sorting:
- Cyber Threat Intelligence - Toolbox☆51Updated 7 years ago
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 2 years ago
- intrusion detection☆24Updated 8 years ago
- Python API for the CVSS v3☆58Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆50Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- A collection of resources for security data☆41Updated 8 years ago
- Presentation Slides and Video links☆32Updated 4 years ago
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 3 months ago
- Specifications used in the MISP project including MISP core format☆52Updated last week
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 4 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46Updated last year
- Maltego transforms for all sorts of things☆21Updated 13 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆41Updated 7 years ago
- Public Code for ICS Evasion Attack Generation☆44Updated 4 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Updated 10 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Open platform for modelling, collection and exchange of knowledge☆162Updated 6 months ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- Best practices in threat intelligence☆48Updated 3 years ago
- Malware/IOC ingestion and processing engine☆107Updated 7 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 4 months ago
- A framework for receiving and redistributing abuse feeds☆124Updated 6 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 5 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago