mehgrmlhmpf / AttackGraphGeneratorMasterThesisLinks
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
☆12Updated 4 years ago
Alternatives and similar repositories for AttackGraphGeneratorMasterThesis
Users that are interested in AttackGraphGeneratorMasterThesis are comparing it to the libraries listed below
Sorting:
- Extracting Attack Behavior from Threat Reports☆81Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆180Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Updated last year
- ☆86Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆103Updated 3 months ago
- ☆132Updated 5 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Updated 2 years ago
- ☆90Updated 3 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- A logic-based enterprise network security analyzer☆137Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28Updated 5 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Updated last year
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆20Updated 7 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆40Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- ☆10Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 6 months ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 5 years ago
- A collection of resources for security data☆41Updated 8 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116Updated 2 years ago
- ICS Cybersecurity PCAP respository☆63Updated 7 years ago
- ☆25Updated 4 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Updated 2 years ago
- Feature extraction for CERT insider threat test dataset☆106Updated last year