Scripts to generate and analyze the AIT alert data set (AIT-ADS)
☆28Jul 9, 2025Updated 8 months ago
Alternatives and similar repositories for alert-data-set
Users that are interested in alert-data-set are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Jun 28, 2024Updated last year
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆54Mar 16, 2026Updated last week
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆91Jan 12, 2026Updated 2 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degre…☆16Sep 23, 2024Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆65Nov 19, 2025Updated 4 months ago
- Code for "Pre-training with Contrastive Learning for Unified Log Analytics"☆20Jan 22, 2024Updated 2 years ago
- ☆86Feb 24, 2025Updated last year
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆49Updated this week
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 11 months ago
- LogLead stands for Log Loader, Enhancer, and Anomaly Detector.☆30Feb 17, 2026Updated last month
- Yes, Erlang in SWI-Prolog!☆12Jun 18, 2018Updated 7 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆28Feb 23, 2026Updated last month
- ☆30Nov 19, 2025Updated 4 months ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- [AAAI 2024] LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection☆53May 27, 2024Updated last year
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆12Jun 22, 2023Updated 2 years ago
- Reason about Bitcoin addresses with Prolog☆23Mar 17, 2024Updated 2 years ago
- some tools plugins☆14May 24, 2023Updated 2 years ago
- Debian Baseimages☆16Mar 13, 2026Updated last week
- Explaining Anomalies Detected by Autoencoders Using SHAP☆33Mar 4, 2020Updated 6 years ago
- CCF_大数据精准营销中搜狗用户画像挖掘☆17Feb 22, 2017Updated 9 years ago
- LangChain for LLM Application Development 学习笔记。#LLM #LangChain #ChatGPT #OpenAI☆27Jun 11, 2023Updated 2 years ago
- A browserless HTML testing library for Python.☆20Dec 3, 2025Updated 3 months ago
- Set of utilities for extracting meta information about react components mostly to generate automated documentation☆11Nov 14, 2019Updated 6 years ago
- CP-APR Tensor Decomposition with PyTorch backend. pyCP_APR can perform non-negative Poisson Tensor Factorization on GPU, and includes an …☆18Dec 18, 2023Updated 2 years ago
- APT-GUID☆23Oct 23, 2020Updated 5 years ago
- 我的远程连接一键部署工具。☆10May 4, 2023Updated 2 years ago
- We propose Endpoint Forecasting and Interpreting (EFI), a real-time attack forecast and interpretation system, which can automatically pr…☆15Aug 16, 2023Updated 2 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago