ait-aecid / kyoushi-environmentLinks
Scripts to deploy virtual testbed for log data analysis and anomaly detection.
☆25Updated last year
Alternatives and similar repositories for kyoushi-environment
Users that are interested in kyoushi-environment are comparing it to the libraries listed below
Sorting:
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆37Updated last year
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 8 months ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- This program allow you to extract some features from pcap files.☆40Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆153Updated 2 years ago
- Network traffic classifier based on machine learning algorithms☆44Updated 3 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆120Updated last year
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆23Updated last week
- ☆55Updated last year
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 3 years ago
- Datasets used in the StreamSpot experiments☆61Updated 9 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆30Updated 2 years ago
- ☆78Updated 2 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆161Updated 2 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆69Updated 3 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 7 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆39Updated last year
- ☆25Updated 4 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆95Updated 11 months ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 4 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆184Updated 2 years ago
- Feature extraction for CERT insider threat test dataset☆97Updated 9 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆95Updated last year
- Material from the DARPA Transparent Computing Program☆196Updated 5 years ago
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆40Updated 5 years ago
- Traffic analysis for Tor-based malware detection and classification☆40Updated 2 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆108Updated 2 years ago