lizitong67 / OSPF_Attack_and_DetectionLinks
☆9Updated 4 years ago
Alternatives and similar repositories for OSPF_Attack_and_Detection
Users that are interested in OSPF_Attack_and_Detection are comparing it to the libraries listed below
Sorting:
- A logic-based enterprise network security analyzer☆125Updated 2 years ago
- Material from the DARPA Transparent Computing Program☆193Updated 5 years ago
- Have fun with audit log analysis :)☆152Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆69Updated last year
- Project created to practice SDN-based Attack & Defence on Modbus/TCP and HTTP protocols in an ICS network.☆19Updated last year
- ☆67Updated 3 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆67Updated last year
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆37Updated 3 months ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆67Updated 2 years ago
- The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in rea…☆253Updated last month
- System traces dataset generation tool.☆13Updated 3 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated 9 months ago
- ICSs virtualized lab for cybersecurity testing☆20Updated last year
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- A demonstration codebase for the routing anomaly detection system featured in the USENIX Security 2024 paper, Learning with Semantics: To…☆19Updated 3 weeks ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆62Updated 6 months ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆80Updated 2 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆63Updated last year
- Some personal work on DARPA TC engagement5☆16Updated last year
- ☆53Updated last year
- ☆36Updated 9 months ago
- ☆17Updated 11 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆44Updated last month
- A framework for synthesizing lateral movement login data.☆24Updated 4 years ago
- ☆109Updated 2 years ago
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆17Updated last year
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆34Updated last year
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆103Updated 7 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 8 months ago