lucadibello / network-attack-detectionLinks
Advanced detection of port scanning, DoS and malware attacks using Machine Learning techniques
☆14Updated 2 years ago
Alternatives and similar repositories for network-attack-detection
Users that are interested in network-attack-detection are comparing it to the libraries listed below
Sorting:
- Public datasets to help you address various cyber security problems.☆463Updated 3 years ago
- ☆21Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated last week
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆202Updated this week
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆141Updated this week
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆857Updated this week
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆206Updated 2 years ago
- A curated list of large language model tools for cybersecurity research.☆481Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆247Updated last year
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆236Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆267Updated this week
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆61Updated 2 months ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Updated last year
- ☆285Updated 5 months ago
- A collection of awesome resources related AI security☆533Updated this week
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆91Updated 3 weeks ago
- Webhawk/Catch helps automatically finding web attack traces in logs☆17Updated 5 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- ☆71Updated 7 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆66Updated 7 months ago
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆69Updated 2 months ago
- log Forenix 🕵️- Your Linux Forensic Artifacts Collector Tool! 🚀☆30Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆58Updated last year
- A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analy…☆44Updated 6 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆88Updated last week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 3 months ago