ait-aecid / logdata-anomaly-minerLinks
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆85Updated last month
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
Sorting:
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated last month
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 4 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- A completely automated anomaly detector Zeek network flows files (conn.log).☆83Updated last week
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 8 months ago
- ☆25Updated 4 years ago
- ☆116Updated 5 years ago
- Argus Sensor☆67Updated 2 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆36Updated 3 months ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆25Updated 3 years ago
- This repository hosts community contributed Kestrel analytics☆17Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆96Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆43Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 10 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆38Updated 2 weeks ago
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆70Updated 6 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆157Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆184Updated 2 years ago
- ☆57Updated 6 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆27Updated last year
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆83Updated 3 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆49Updated 3 months ago
- An Adaptive Misuse Detection System☆42Updated 9 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated last month
- A collection of resources for security data☆41Updated 7 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆62Updated last year