A method for grouping, clustering, and merging semi-structured alerts
☆24Nov 15, 2024Updated last year
Alternatives and similar repositories for aecid-alert-aggregation
Users that are interested in aecid-alert-aggregation are comparing it to the libraries listed below
Sorting:
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆91Jan 12, 2026Updated last month
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 4 months ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Jul 2, 2020Updated 5 years ago
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆20Dec 16, 2020Updated 5 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Robust Log-Based Anomaly Detection on Unstable Log Data☆19Feb 24, 2020Updated 6 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- GAINS: Getting stArted wIth biNary analysiS☆32Feb 23, 2022Updated 4 years ago
- IForestASD for Anomaly Detection in Scikit-MultiFLow☆28Jun 21, 2020Updated 5 years ago
- Analyze system log messages constructing DAG with PC algorithm☆30Jul 1, 2019Updated 6 years ago
- Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.☆37Nov 26, 2025Updated 3 months ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆33Mar 4, 2020Updated 6 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- RNN-based IDS for SOME/IP Intrusion Detection☆10Jul 20, 2021Updated 4 years ago
- ☆11Mar 31, 2022Updated 3 years ago
- This is for Meridian (Traditional Chinese Medicine conception) prediction by machining learning method.☆11Sep 30, 2019Updated 6 years ago
- ☆13Feb 25, 2026Updated last week
- ☆11Dec 4, 2024Updated last year
- ☆10May 28, 2024Updated last year
- An easy and efficient tool to build sequential recommendation system utilizing SASRec☆10Nov 1, 2023Updated 2 years ago
- 图像分类系统,采用HOG+SVM/Sotfmax分类器,神经网络采用卷积神经网络和34层的深度参查网络,利用基于tensorflow的tflearn实现。☆10May 23, 2017Updated 8 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆105Nov 9, 2025Updated 3 months ago
- ☆11Jun 7, 2025Updated 8 months ago
- ☆13Sep 23, 2024Updated last year
- Codes for the Nature Conservancy Fish classification challenge☆10Jan 2, 2017Updated 9 years ago
- A small database to test different machine learning tasks. It contains simple shapes of different colors.☆11Sep 18, 2022Updated 3 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- Share secrets encrypted☆14Updated this week
- This repository contains comprehensive pricing and configuration data for LLMs. It powers cost attribution for 200+ enterprises running 4…☆61Updated this week
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago