ait-aecid / logdata-anomaly-minerLinks
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆85Updated 2 weeks ago
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
Sorting:
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 3 weeks ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Updated 9 months ago
- ☆25Updated 4 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆26Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆96Updated last year
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆60Updated 4 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆96Updated last year
- ☆119Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆36Updated 4 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆44Updated last year
- Repository of creating different example suricata data sets☆35Updated 6 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated 2 weeks ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 11 months ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 8 months ago
- This repository hosts community contributed Kestrel analytics☆18Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆160Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆185Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated 2 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆23Updated last month
- PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning☆242Updated last year
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- ☆56Updated 6 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆62Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆125Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆54Updated 3 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated 2 years ago
- An Adaptive Misuse Detection System☆44Updated 9 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆26Updated last year