mehgrmlhmpf / AttackGraphGeneratorMasterThesisLinks
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
☆12Updated 4 years ago
Alternatives and similar repositories for AttackGraphGeneratorMasterThesis
Users that are interested in AttackGraphGeneratorMasterThesis are comparing it to the libraries listed below
Sorting:
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆152Updated 2 years ago
- ☆25Updated last year
- ☆77Updated 2 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆93Updated 10 months ago
- ☆23Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 8 months ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆61Updated 5 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆36Updated 11 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- Import Mitre Att&ck into Neo4j database☆36Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆34Updated last year
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆15Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated 5 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- ☆110Updated 4 years ago
- ☆83Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆34Updated last month
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆44Updated last month
- A Knowledge Graph for Open Source Security Tools☆18Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆93Updated 11 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆26Updated 5 years ago
- A framework for synthesizing lateral movement login data.☆24Updated 4 years ago
- ☆23Updated 3 years ago
- Insider threat detection via bert☆20Updated 3 years ago