mehgrmlhmpf / AttackGraphGeneratorMasterThesis
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for AttackGraphGeneratorMasterThesis
- ☆19Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆137Updated last year
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆57Updated 4 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆16Updated 2 years ago
- ☆73Updated last year
- ☆24Updated last year
- ☆77Updated last year
- Import Mitre Att&ck into Neo4j database☆33Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆24Updated 4 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆71Updated 4 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated last year
- ☆96Updated 4 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 7 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆19Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆116Updated last year
- ☆12Updated last year
- CTI database generator and public dataset☆21Updated 4 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆16Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆36Updated 2 months ago
- Official repository for MalKG☆20Updated 3 years ago
- A Knowledge Graph for Open Source Security Tools☆15Updated last year
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆27Updated last month
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆18Updated 5 years ago