lucadibello / network-attack-detectionLinks
Advanced detection of port scanning, DoS and malware attacks using Machine Learning techniques
☆15Updated 2 years ago
Alternatives and similar repositories for network-attack-detection
Users that are interested in network-attack-detection are comparing it to the libraries listed below
Sorting:
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆91Updated last year
- ☆64Updated 7 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated 3 months ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆31Updated last year
- Public datasets to help you address various cyber security problems.☆460Updated 3 years ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆54Updated last year
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆31Updated last year
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆89Updated 2 weeks ago
- Advanced OPC-UA framework for vulnerability research & exploitation☆64Updated 2 years ago
- This is the Network Flow Generator for ICSSIM☆15Updated 3 months ago
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆35Updated last month
- ☆13Updated 2 years ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆257Updated this week
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆26Updated 2 months ago
- A network scanning solution for information gathering in large IT/OT network environments.☆27Updated 3 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆139Updated this week
- ☆73Updated 8 months ago
- Open-source CMDB for ICS and OT environments — map assets, visualize networks, track changes, and keep control.☆46Updated 2 weeks ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆48Updated 2 months ago
- Industrial Control Systems Network Protocol Parsers☆184Updated 3 months ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆60Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆88Updated this week
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Updated 9 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆59Updated last year
- About the ETHOS open source initiative☆25Updated 2 years ago
- A curated list of large language model tools for cybersecurity research.☆478Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated 3 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 2 months ago
- Lists of products useful for ICS security☆107Updated last year
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆237Updated 2 years ago