hunting-rules
Network anomaly detector
Provides Suricata IDS alert rules for detecting network anomalies
Suricata rules for network anomaly detection
154 stars
16 watching
42 forks
last commit: 3 months ago
Linked from 1 awesome list
anomaly-detectioncyber-threat-intelligencecybersecurityidslateral-movementnetwork-monitoringnetwork-securitynsmsuricatasuricata-rulethreat-huntingthreat-intelligence
Related projects:
Repository | Description | Stars |
---|---|---|
| Customized Suricata detection rules to identify NMAP scan types | 59 |
| A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. | 1,140 |
| A collection of rules and configuration files for Suricata, a network traffic analysis tool | 5 |
| A web-based interface for managing Suricata rulesets and threat hunting. | 636 |
| Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack | 40 |
| A package providing functions to decompose and detect anomalies in time series data | 339 |
| An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts | 1,492 |
| An anomaly detection framework for flexible and efficient metric analysis | 280 |
| Collection of resources and concepts for threat hunting and detection engineering. | 372 |
| Automates importing threat intelligence data into Suricata's surveillance system | 37 |
| This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. | 284 |
| Automated network vulnerability scanning and reconnaissance tool | 433 |
| A PyTorch implementation of a feature attribution technique using Wasserstein Generative Adversarial Networks for anomaly detection in medical images. | 93 |
| A centralized repository of Yara rules for detecting malware and other malicious activities. | 10 |
| A collection of various rulesets for network intrusion detection systems | 22 |