eneagizzarelli / SYNAPSELinks
SYNAPSE (SYNthetic AI Pot for Security Enhancement) and SYNAPSE-to-MITRE code repository. This project has been realized for my MSc degree thesis in Cybersecurity at Politecnico di Torino, in partnership with SECURITY REPLY S.R.L.
☆15Updated 11 months ago
Alternatives and similar repositories for SYNAPSE
Users that are interested in SYNAPSE are comparing it to the libraries listed below
Sorting:
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Updated last year
- A logic-based enterprise network security analyzer☆128Updated 2 years ago
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems☆21Updated 5 months ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆24Updated last month
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆51Updated 3 weeks ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Updated 8 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆39Updated 3 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆11Updated 4 years ago
- ☆35Updated last year
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆162Updated 2 years ago
- Grey-box fuzzer SIVO☆14Updated 4 years ago
- Chat4GPT Experiments for Security☆11Updated 2 years ago
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆14Updated last year
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆48Updated last year
- ☆25Updated 4 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆33Updated 2 years ago
- ☆10Updated 5 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Updated last year
- ☆15Updated 4 years ago
- ☆16Updated 2 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Updated 3 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆23Updated 6 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- ☆21Updated last year