ait-aecid / logdata-anomaly-miner
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
☆81Updated 2 weeks ago
Alternatives and similar repositories for logdata-anomaly-miner:
Users that are interested in logdata-anomaly-miner are comparing it to the libraries listed below
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 5 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 9 months ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆21Updated 6 months ago
- PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning☆233Updated 8 months ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆23Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆112Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆88Updated 9 months ago
- Analysis scripts for log data sets used in anomaly detection.☆66Updated 8 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆55Updated 4 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆35Updated 2 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆148Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆178Updated last year
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆62Updated last year
- ☆106Updated 4 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆35Updated 9 months ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- ☆76Updated 2 years ago
- ☆22Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆23Updated last year
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- Log-based Anomaly Detection Without Log Parsing (ASE 2021, Research Track)☆127Updated last year
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆24Updated last year
- User and Entity Behavior Analytics by deep learning☆109Updated 4 years ago
- This is the Network Flow Generator for ICSSIM☆13Updated last month
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆23Updated 2 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆66Updated 6 years ago
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆18Updated 2 months ago