stratosphereips / zeek_anomaly_detector
A completely automated anomaly detector Zeek network flows files (conn.log).
☆75Updated 7 months ago
Alternatives and similar repositories for zeek_anomaly_detector:
Users that are interested in zeek_anomaly_detector are comparing it to the libraries listed below
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- A collection of resources for security data☆41Updated 7 years ago
- ☆101Updated 4 years ago
- zeek-scripts☆44Updated 6 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆55Updated 4 years ago
- Zeek Training Materials/Products☆37Updated last month
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46Updated 9 months ago
- ICS Cybersecurity PCAP respository☆52Updated 6 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆119Updated last year
- Zeek support for Community ID flow hashing.☆35Updated last year
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆65Updated 5 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆99Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 8 months ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41Updated 9 months ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆75Updated 7 years ago
- Cyber Threat Intelligence Feeds☆95Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆71Updated 9 months ago
- The Security Analyst’s Guide to Suricata☆54Updated 9 months ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- Docker files for building Zeek.☆86Updated last year
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeek☆32Updated 6 months ago
- Definition, description and relationship types of MISP objects☆96Updated last week
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- Zeek IDS Dockerfile☆101Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- ☆45Updated last year