ait-aecid / logdata-anomaly-minerLinks
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆90Updated 2 weeks ago
Alternatives and similar repositories for logdata-anomaly-miner
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
Sorting:
- Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather th…☆191Updated 3 months ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 5 months ago
- Open source endpoint agent providing host information to Zeek. [v2]☆90Updated this week
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- ☆25Updated 4 years ago
- ☆131Updated 5 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆102Updated 2 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 5 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Updated last year
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆31Updated 2 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆28Updated 6 months ago
- Argus Sensor☆74Updated last week
- Pure python parser for Snort/Suricata rules.☆33Updated last year
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 9 months ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Updated last month
- This repository hosts community contributed Kestrel analytics☆18Updated last year
- Repository of creating different example suricata data sets☆36Updated 7 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- The Security Analyst’s Guide to Suricata☆61Updated 9 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆178Updated 2 years ago
- An Adaptive Misuse Detection System☆46Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆84Updated last month
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Updated 2 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Updated 4 years ago
- A framework for the Analysis of Intrusion Detection Alerts