ait-aecid / logdata-anomaly-minerLinks
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆86Updated last month
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated last month
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated 2 weeks ago
- Repository of creating different example suricata data sets☆36Updated 6 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- This repository hosts community contributed Kestrel analytics☆18Updated last year
- ☆122Updated 5 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆96Updated last year
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 9 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆37Updated 5 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆26Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆44Updated last year
- ☆56Updated 6 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆26Updated 3 years ago
- ☆25Updated 4 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆28Updated 2 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Updated 10 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆126Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆48Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆188Updated 2 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 4 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆43Updated 2 weeks ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆37Updated 2 weeks ago
- The Security Analyst’s Guide to Suricata☆58Updated 4 months ago
- PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning☆246Updated last year
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆37Updated 3 months ago
- A MITRE Caldera plugin☆46Updated 10 months ago
- Augmentation to Machine Readable CTI☆32Updated last week
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆65Updated 2 years ago
- ☆28Updated 4 years ago