ait-aecid / logdata-anomaly-miner
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆67Updated last month
Related projects: ⓘ
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆18Updated 10 months ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆72Updated last month
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆84Updated 2 months ago
- A method for grouping, clustering, and merging semi-structured alerts☆15Updated 6 months ago
- Log-based Anomaly Detection Without Log Parsing (ASE 2021, Research Track)☆101Updated last year
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆53Updated 3 years ago
- Repository of creating different example suricata data sets☆30Updated 5 years ago
- Log anomaly detection model using a CNN with TF-IDF and sliding window feature extraction.☆41Updated 2 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆101Updated 2 years ago
- Collection of Snort 2/3 rules.☆28Updated 6 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆63Updated 5 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆16Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆65Updated 2 months ago
- ☆89Updated 4 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆44Updated 2 years ago
- PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning☆190Updated last month
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆90Updated last year
- Feature Extraction and Machine Learning from Network Traffic Traces☆57Updated last month
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆54Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆34Updated last week
- The final project of deep learning and practice (summer 2020) in NCTU.☆23Updated 2 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆15Updated 5 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆55Updated 5 years ago
- log anomaly detection via BERT☆235Updated 3 months ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆22Updated 7 years ago
- This repository hosts community contributed Kestrel analytics☆14Updated 3 months ago
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- ☆18Updated 3 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆30Updated last month
- Analysis scripts for log data sets used in anomaly detection.☆28Updated last month