ait-aecid / logdata-anomaly-minerLinks
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆85Updated last month
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
Sorting:
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 7 months ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆23Updated 8 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆25Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆93Updated 11 months ago
- Analysis scripts for log data sets used in anomaly detection.☆72Updated 10 months ago
- Log-based Anomaly Detection Without Log Parsing (ASE 2021, Research Track)☆135Updated 2 years ago
- ☆24Updated 4 years ago
- ☆111Updated 5 years ago
- LogLead stands for Log Loader, Enhancer, and Anomaly Detector.☆24Updated 2 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆83Updated last week
- PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning☆239Updated 10 months ago
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- Argus Sensor☆67Updated last month
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 10 months ago
- An deep learning based lightweight TCN for log anomaly detection.☆39Updated 3 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆112Updated 3 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆56Updated 4 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- A Large-scale Evaluation for Log Parsing Techniques: How Far are We? [ISSTA'24]☆112Updated 2 weeks ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆52Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 9 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆95Updated 11 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆182Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- A deep learning toolkit for log-based anomaly detection☆243Updated last year
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆38Updated 4 months ago
- Log-based Anomaly Detection with Deep Learning: How Far Are We? (ICSE 2022, Technical Track)☆197Updated 9 months ago
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆19Updated 4 months ago
- PyTorch implements "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning"☆91Updated this week