A method for grouping, clustering, and merging semi-structured alerts
☆24Nov 15, 2024Updated last year
Alternatives and similar repositories for aecid-alert-aggregation
Users that are interested in aecid-alert-aggregation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆31Jul 9, 2025Updated 9 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆90Jan 12, 2026Updated 3 months ago
- ☆23Sep 8, 2025Updated 7 months ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 6 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated 2 years ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- Robust Log-Based Anomaly Detection on Unstable Log Data☆18Feb 24, 2020Updated 6 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆17Nov 26, 2025Updated 5 months ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆14Sep 23, 2024Updated last year
- This is a static version of ACN-Data (https://ev.caltech.edu/dataset), collected from three sites from 2018 to 2020.☆21Updated this week
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆16Jan 22, 2025Updated last year
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 4 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 7 months ago
- ☆29Apr 13, 2026Updated 3 weeks ago
- ☆11Jul 8, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Jul 2, 2020Updated 5 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Python package providing a simple interface to manipulate Elasticsearch queries and aggregations☆11Apr 1, 2026Updated last month
- Summarize CTI reports with OpenAI☆18Apr 27, 2026Updated last week
- ☆19Jan 2, 2025Updated last year
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆20Dec 16, 2020Updated 5 years ago
- LogLead performs log loading, log enhancement, log feature engineering, log analysis, log anomaly detection.☆30Feb 17, 2026Updated 2 months ago
- ☆27Sep 20, 2023Updated 2 years ago
- ☆12Jun 7, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Print the uncompressed size of a GZip file.☆14Sep 16, 2019Updated 6 years ago
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆13Dec 1, 2023Updated 2 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆177Sep 3, 2022Updated 3 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆20Aug 3, 2023Updated 2 years ago
- The rev.ng demos☆13Mar 11, 2026Updated last month
- Some stuff for PHD2021☆14May 21, 2025Updated 11 months ago