hunting-rules
Network anomaly detector
Provides Suricata IDS alert rules for detecting network anomalies
Suricata rules for network anomaly detection
154 stars
16 watching
42 forks
last commit: 11 months ago
Linked from 1 awesome list
anomaly-detectioncyber-threat-intelligencecybersecurityidslateral-movementnetwork-monitoringnetwork-securitynsmsuricatasuricata-rulethreat-huntingthreat-intelligence
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Customized Suricata detection rules to identify NMAP scan types | 59 |
| | A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. | 1,140 |
| | A collection of rules and configuration files for Suricata, a network traffic analysis tool | 5 |
| | A web-based interface for managing Suricata rulesets and threat hunting. | 636 |
| | Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack | 40 |
| | A package providing functions to decompose and detect anomalies in time series data | 339 |
| | An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts | 1,492 |
| | An anomaly detection framework for flexible and efficient metric analysis | 280 |
| | Collection of resources and concepts for threat hunting and detection engineering. | 372 |
| | Automates importing threat intelligence data into Suricata's surveillance system | 37 |
| | This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. | 284 |
| | Automated network vulnerability scanning and reconnaissance tool | 433 |
| | A PyTorch implementation of a feature attribution technique using Wasserstein Generative Adversarial Networks for anomaly detection in medical images. | 93 |
| | A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
| | A collection of various rulesets for network intrusion detection systems | 22 |