mehgrmlhmpf / AttackGraphGeneratorMasterThesis
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
☆12Updated 3 years ago
Alternatives and similar repositories for AttackGraphGeneratorMasterThesis:
Users that are interested in AttackGraphGeneratorMasterThesis are comparing it to the libraries listed below
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆145Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆32Updated 6 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆22Updated 3 years ago
- ☆20Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆39Updated 4 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆78Updated 5 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- ☆25Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- ☆74Updated last year
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 9 months ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆12Updated last month
- A framework for synthesizing lateral movement login data.☆21Updated 3 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆34Updated last month
- A method for grouping, clustering, and merging semi-structured alerts☆22Updated 2 months ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- A logic-based enterprise network security analyzer☆112Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- ☆97Updated 4 years ago
- ☆30Updated 6 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆31Updated 3 weeks ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆26Updated 4 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Updated last year
- ☆80Updated 2 years ago
- Unfetter Insight performs natural language processing and analysis for text data to determine and convert to CTI Stix data automatically.☆19Updated 6 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆30Updated last month
- MALOnt - an ontology for Malware Threat Intelligence.☆9Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 6 months ago