mehgrmlhmpf / AttackGraphGeneratorMasterThesis
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for AttackGraphGeneratorMasterThesis
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆19Updated last year
- ☆24Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆137Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 7 months ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆27Updated last month
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 4 years ago
- ☆73Updated last year
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆57Updated 4 years ago
- ☆18Updated 3 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆115Updated 11 months ago
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆71Updated 3 months ago
- ☆75Updated last year
- ☆96Updated 4 years ago
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆17Updated 5 years ago
- A Knowledge Graph for Open Source Security Tools☆15Updated last year
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆26Updated 5 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆16Updated 2 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆13Updated last year
- Import Mitre Att&ck into Neo4j database☆33Updated last year
- This repository hosts community contributed Kestrel analytics☆15Updated 5 months ago
- ☆16Updated 5 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆87Updated 4 months ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆24Updated 4 years ago