Scripts to generate and analyze the AIT alert data set (AIT-ADS)
☆31Jul 9, 2025Updated 9 months ago
Alternatives and similar repositories for alert-data-set
Users that are interested in alert-data-set are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆57Mar 16, 2026Updated last month
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆11Nov 19, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆90Jan 12, 2026Updated 3 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- Code for "Pre-training with Contrastive Learning for Unified Log Analytics"☆21Jan 22, 2024Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- ☆87Feb 24, 2025Updated last year
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆50Updated this week
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- This is a boilerplate which has dependencies for pyspark(3.3.0) mongo(>4.x) connectivity☆10May 3, 2024Updated 2 years ago
- Includes simple docker structure for machine learning projects.☆14Feb 8, 2023Updated 3 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated last year
- LogLead performs log loading, log enhancement, log feature engineering, log analysis, log anomaly detection.☆30Feb 17, 2026Updated 2 months ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆31Feb 23, 2026Updated 2 months ago
- Have fun with audit log analysis :)☆155May 5, 2024Updated last year
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- Suricata inside a container using Docker☆28Aug 8, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A static analysis tool for Java programs, based on the theory of code property graphs.☆20Mar 27, 2023Updated 3 years ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Jun 3, 2023Updated 2 years ago
- 通过微信公众号推送漏洞消息☆18Dec 27, 2021Updated 4 years ago
- Alpine Docker Container for proxy services with IP Tables☆10Aug 31, 2019Updated 6 years ago
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 4 years ago
- LangChain for LLM Application Development 学习笔记。#LLM #LangChain #ChatGPT #OpenAI☆27Jun 11, 2023Updated 2 years ago
- Journal Article: International Journal of Information Technology☆14Jun 27, 2023Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- systemd sockets for node.js applications☆13Jul 12, 2015Updated 10 years ago
- APT-GUID☆23Oct 23, 2020Updated 5 years ago
- Codebase used to generate the results for NeurIPS23 "Adversarial Training for Graph Neural Networks: Pitfalls, Solutions, and New Directi…☆13Dec 8, 2023Updated 2 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆24Aug 13, 2024Updated last year
- ☆128May 3, 2023Updated 3 years ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year