ait-aecid / logdata-anomaly-minerLinks
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆81Updated last month
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
Sorting:
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 6 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆25Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆93Updated 11 months ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆22Updated 7 months ago
- ☆23Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆93Updated 10 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 8 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆56Updated 4 years ago
- PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning☆237Updated 9 months ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).☆80Updated 10 months ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆25Updated 3 years ago
- Analysis scripts for log data sets used in anomaly detection.☆70Updated 10 months ago
- LogLead stands for Log Loader, Enhancer, and Anomaly Detector.☆23Updated last month
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- ☆110Updated 4 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆65Updated 5 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆111Updated 3 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆37Updated 3 months ago
- Argus Sensor☆64Updated 2 weeks ago
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆19Updated 3 months ago
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- This repository hosts community contributed Kestrel analytics☆17Updated last year
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆25Updated 2 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆51Updated 3 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆34Updated last year
- Feature Extraction and Machine Learning from Network Traffic Traces☆69Updated 10 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- ☆77Updated 2 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆82Updated this week