hi-zer / Industrial-protocols-datasetLinks
This is an industrial dataset contains eight different types of ICS protocols, mainly collected for the evaluation of protocol reverse engineering tools. We hope it can be supplemented in the future.
☆16Updated 2 years ago
Alternatives and similar repositories for Industrial-protocols-dataset
Users that are interested in Industrial-protocols-dataset are comparing it to the libraries listed below
Sorting:
- Modbus Dataset from CSET 2016☆48Updated 2 years ago
- A protocol reverse engineering tool for industrial binary protocol based on pin tool☆17Updated 5 years ago
- ICS/SCADA Security Resource(整合工控安全相关资源)☆943Updated 7 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- Re-implementation of the protocol reverse engineering approach FieldHunter☆16Updated 3 years ago
- ICS Common Protocol Simulator工控常见协议模拟工具集☆56Updated 5 years ago
- ☆13Updated 4 years ago
- SCADA network attack datasets and process logs☆20Updated 8 years ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Updated last year
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Updated 2 years ago
- Malmod☆14Updated 5 years ago
- EtherNet/IP+CIP dissector for Scapy☆101Updated 8 years ago
- ☆32Updated 4 years ago
- ☆14Updated 6 years ago
- ☆28Updated 3 years ago
- A tool for reverse engineering industrial control systems binaries.☆177Updated last year
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated last year
- Material from the DARPA Transparent Computing Program☆221Updated 5 years ago
- Using nmap NSE scripts for identifying common ICS protocols[使用nmap的nse脚本对常见工控协议进行识别,附对应nse脚本,并记录pcap流量]☆151Updated 5 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆219Updated last year
- ☆11Updated 4 years ago
- ☆28Updated 4 years ago
- ☆28Updated last year
- 基于机器学习的恶意加密流量监测平台☆145Updated 4 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Updated 2 years ago
- ☆60Updated last year
- Flow Interaction Graph based attack traffic detection system.☆184Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Updated last year
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆34Updated 5 years ago
- ☆27Updated 6 years ago