ait-aecid / logdata-anomaly-miner
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆79Updated 3 months ago
Alternatives and similar repositories for logdata-anomaly-miner:
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 3 months ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 6 months ago
- ☆100Updated 4 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆44Updated 5 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- ☆21Updated 3 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆21Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆83Updated 7 months ago
- Argus Sensor☆58Updated this week
- Open source endpoint agent providing host information to Zeek. [v2]☆75Updated 4 months ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆19Updated 4 months ago
- A logic-based enterprise network security analyzer☆114Updated 2 years ago
- Repository of creating different example suricata data sets☆32Updated 6 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆40Updated 6 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆148Updated last year
- Material from the DARPA Transparent Computing Program☆190Updated 4 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 7 months ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆18Updated 3 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆33Updated 2 weeks ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆105Updated 2 years ago
- Log Anomaly Detection - Machine learning to detect abnormal events logs☆325Updated last year
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆62Updated 5 years ago
- ☆75Updated last year
- AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.☆29Updated this week
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆54Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆64Updated last year
- Coburg Intrusion Detection Data Sets☆49Updated 7 years ago