tum-i4 / attack-graph-generator
☆30Updated 4 years ago
Alternatives and similar repositories for attack-graph-generator:
Users that are interested in attack-graph-generator are comparing it to the libraries listed below
- Attack graph construction and analysis☆34Updated 5 years ago
- ☆13Updated 5 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆34Updated 8 months ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆11Updated 4 months ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆32Updated 9 months ago
- Material from the DARPA Transparent Computing Program☆190Updated 4 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- A logic-based enterprise network security analyzer☆116Updated 2 years ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Updated last year
- Cyber attack toolchain integrating MulVAL☆9Updated 2 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆149Updated 2 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Updated 9 years ago
- This is a paper list about Machine Learning for IDSes☆88Updated 6 months ago
- Have fun with audit log analysis :)☆149Updated 9 months ago
- Modbus Dataset from CSET 2016☆45Updated last year
- ☆11Updated 5 years ago
- ☆23Updated 4 years ago
- ☆75Updated last year
- Public Arena dataset☆12Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆149Updated last year
- ☆14Updated 4 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆20Updated last year
- This project contains 10010 ELF files (6165 IoT Botnet of different variant and 3845 benign files)☆8Updated 5 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆13Updated 4 years ago
- Usenix Security'23☆14Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆29Updated 6 months ago
- ☆21Updated 3 years ago