mehgrmlhmpf / AttackGraphGeneratorMasterThesisLinks
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
☆12Updated 4 years ago
Alternatives and similar repositories for AttackGraphGeneratorMasterThesis
Users that are interested in AttackGraphGeneratorMasterThesis are comparing it to the libraries listed below
Sorting:
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- ☆23Updated 4 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆93Updated 11 months ago
- ☆25Updated last year
- ☆77Updated 2 years ago
- A Knowledge Graph for Open Source Security Tools☆18Updated last year
- ☆83Updated 2 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆61Updated 5 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆37Updated 11 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆47Updated last month
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 9 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆26Updated 5 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Import Mitre Att&ck into Neo4j database☆36Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆34Updated last year
- MALOnt - an ontology for Malware Threat Intelligence.☆11Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆34Updated 2 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated 6 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆123Updated last year
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆18Updated 5 years ago
- Official repository for MalKG☆22Updated 4 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 7 months ago
- ☆111Updated 5 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆67Updated 2 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆30Updated 2 years ago