A method for grouping, clustering, and merging semi-structured alerts
☆24Nov 15, 2024Updated last year
Alternatives and similar repositories for aecid-alert-aggregation
Users that are interested in aecid-alert-aggregation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆90Jan 12, 2026Updated 3 months ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- ☆22Sep 8, 2025Updated 7 months ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- Code for "Pre-training with Contrastive Learning for Unified Log Analytics"☆20Jan 22, 2024Updated 2 years ago
- Robust Log-Based Anomaly Detection on Unstable Log Data☆18Feb 24, 2020Updated 6 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆17Nov 26, 2025Updated 4 months ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆15Jan 22, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 3 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- ☆15Mar 26, 2026Updated 3 weeks ago
- ☆28Jun 24, 2022Updated 3 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Jul 2, 2020Updated 5 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Python package providing a simple interface to manipulate Elasticsearch queries and aggregations☆11Apr 1, 2026Updated 2 weeks ago
- Summarize CTI reports with OpenAI☆18Apr 7, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆20Dec 16, 2020Updated 5 years ago
- LogLead performs log loading, log enhancement, log feature engineering, log analysis, log anomaly detection.☆30Feb 17, 2026Updated last month
- ☆27Sep 20, 2023Updated 2 years ago
- Code for: Embedding contrastive unsupervised features to cluster in-and out-of-distribution noise in corrupted image datasets (ECCV 2022)☆14Sep 30, 2022Updated 3 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- ☆11Jun 7, 2025Updated 10 months ago
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆13Dec 1, 2023Updated 2 years ago
- Install and manage the autosign gem, to faciliate puppet certificate policy autosigning☆11Mar 27, 2026Updated 2 weeks ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Log-based anomaly detection☆14Jul 2, 2025Updated 9 months ago
- Debian Baseimages☆16Updated this week
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆19Aug 3, 2023Updated 2 years ago
- The rev.ng demos☆13Mar 11, 2026Updated last month
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- systemd sockets for node.js applications☆13Jul 12, 2015Updated 10 years ago