westlifezs / ClassifcalNetworkSecurityTopologies
this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.
☆12Updated 8 years ago
Alternatives and similar repositories for ClassifcalNetworkSecurityTopologies:
Users that are interested in ClassifcalNetworkSecurityTopologies are comparing it to the libraries listed below
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆8Updated 2 months ago
- Cyber attack toolchain integrating MulVAL☆9Updated 2 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆32Updated 8 months ago
- Attack graph construction and analysis☆34Updated 5 years ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Updated last year
- ☆30Updated 3 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆32Updated 6 months ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- A logic-based enterprise network security analyzer☆112Updated last year
- Modbus Dataset from CSET 2016☆43Updated last year
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆14Updated 5 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆90Updated last year
- ☆22Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆105Updated 5 months ago
- This is a paper list about Machine Learning for IDSes☆88Updated 4 months ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆49Updated 4 years ago
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Updated 6 years ago
- ☆26Updated last year
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆12Updated last month
- The FlexFringe tool for flexible learning of state machines (deterministic automata) from traces. See the paper at https://arxiv.org/abs/…☆18Updated last week
- A library for adversarial classifier evasion☆40Updated 10 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆185Updated 4 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- Coburg Intrusion Detection Data Sets☆48Updated 7 years ago
- ☆14Updated 3 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆12Updated 5 years ago