A method for grouping, clustering, and merging semi-structured alerts
☆24Nov 15, 2024Updated last year
Alternatives and similar repositories for aecid-alert-aggregation
Users that are interested in aecid-alert-aggregation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆28Jul 9, 2025Updated 8 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Jun 28, 2024Updated last year
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆91Jan 12, 2026Updated 2 months ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- ☆21Sep 8, 2025Updated 6 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 5 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆32Feb 23, 2022Updated 4 years ago
- Robust Log-Based Anomaly Detection on Unstable Log Data☆18Feb 24, 2020Updated 6 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- ☆13Sep 23, 2024Updated last year
- This is a static version of ACN-Data (https://ev.caltech.edu/dataset), collected from three sites from 2018 to 2020.☆19Aug 8, 2024Updated last year
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 3 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- ☆28Jun 24, 2022Updated 3 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆22Sep 9, 2025Updated 6 months ago
- ☆11Jul 8, 2024Updated last year
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Python package providing a simple interface to manipulate Elasticsearch queries and aggregations☆11Feb 5, 2026Updated last month
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆20Dec 16, 2020Updated 5 years ago
- LogLead stands for Log Loader, Enhancer, and Anomaly Detector.☆30Feb 17, 2026Updated last month
- Simulate Attacks With Mininet And Hping3☆16Jul 1, 2021Updated 4 years ago
- Code for: Embedding contrastive unsupervised features to cluster in-and out-of-distribution noise in corrupted image datasets (ECCV 2022)☆14Sep 30, 2022Updated 3 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆12Dec 1, 2023Updated 2 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Log-based anomaly detection☆14Jul 2, 2025Updated 8 months ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Sep 3, 2022Updated 3 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- The rev.ng demos☆13Mar 11, 2026Updated 2 weeks ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- 我的远程连接一键部署工具。☆10May 4, 2023Updated 2 years ago
- Material from the DARPA Transparent Computing Program☆229Apr 29, 2020Updated 5 years ago