msstate-dasi / csb
Big Data Benchmarking Suite for Cyber-Security Analytics
☆10Updated 7 years ago
Alternatives and similar repositories for csb:
Users that are interested in csb are comparing it to the libraries listed below
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Cyber Security feature extraction python library☆9Updated 2 years ago
- ☆16Updated 6 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 4 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Updated 7 years ago
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 4 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Updated 10 years ago
- Anomaly detection and monitoring software☆20Updated 6 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆31Updated 7 months ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- The comparison of the performance of different machine learning methods for computer security problems☆10Updated 11 months ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆28Updated 2 years ago
- Graph database version of the CVE database☆25Updated 2 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆23Updated 5 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- PDF Malware Parser☆20Updated 8 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- Extract relationships between cyber security entities within unstructured text☆23Updated 6 years ago
- Data and code for malware classification using machine learning (for fun, not production)☆39Updated 5 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆68Updated last month
- This is a team project on the subject of information security of cyber industrial systems. Made by students of MEPhI group B17-505.☆11Updated 4 years ago
- Extract cyber security entities from unstructured text☆33Updated 8 years ago
- MAS - Modbus Attack Scripts☆10Updated 6 years ago
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆14Updated last week
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆13Updated 4 months ago
- You're busted!☆26Updated 5 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Updated 11 years ago