ait-aecid / logdata-anomaly-minerLinks
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆90Updated last month
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
Sorting:
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 5 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆109Updated last year
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated last month
- ☆25Updated 4 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 8 months ago
- ☆128Updated 5 years ago
- Repository of creating different example suricata data sets☆36Updated 7 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆102Updated 2 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆47Updated 2 weeks ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆27Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆175Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆204Updated 2 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Updated 4 years ago
- Argus Sensor☆74Updated 2 weeks ago
- PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning☆262Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- This repository hosts community contributed Kestrel analytics☆18Updated last year
- Open Source Threat Intelligence Platform☆161Updated this week
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last week
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆98Updated 7 months ago
- Extracting Attack Behavior from Threat Reports☆80Updated 2 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- The Security Analyst’s Guide to Suricata☆61Updated 8 months ago