hunting-rules

Network anomaly detector

Provides Suricata IDS alert rules for detecting network anomalies

Suricata rules for network anomaly detection

GitHub

153 stars
16 watching
41 forks
last commit: 3 months ago
Linked from 1 awesome list

anomaly-detectioncyber-threat-intelligencecybersecurityidslateral-movementnetwork-monitoringnetwork-securitynsmsuricatasuricata-rulethreat-huntingthreat-intelligence

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
aleksibovellan/opnsense-suricata-nmaps Customized Suricata detection rules to identify NMAP scan types 52
al0ne/suricata-rules A repository of high-quality Suricata IDS rules for detecting various malicious activities and behaviors. 1,133
quadrantsec/suricata-rules A collection of rules and configuration files for Suricata, a network traffic analysis tool 5
stamusnetworks/scirius A web application for managing Suricata rulesets and threat hunting 635
stamusnetworks/kts7 Templates and dashboards for threat hunting with Suricata IDPS/NSM and the ELK 7 stack 39
business-science/anomalize A package providing functions to decompose and detect anomalies in time series data 339
stamusnetworks/selks An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts 1,479
nathanielc/morgoth An anomaly detection framework for flexible and efficient metric analysis 280
sbousseaden/slides Collection of resources and concepts for threat hunting and detection engineering. 372
sebdraven/iocmite Automates importing threat intelligence data into Suricata's surveillance system 37
sbasu7241/aws-threat-simulation-and-detection This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. 282
johnnyxmas/scancannon Automated network vulnerability scanning and reconnaissance tool 432
orobix/visual-feature-attribution-using-wasserstein-gans-pytorch A PyTorch implementation of a feature attribution technique using Wasserstein Generative Adversarial Networks for anomaly detection in medical images. 93
neo23x0/rules A centralized repository of Yara rules for detecting malware and other malicious activities. 10
klingerko/nids-rule-library A collection of various rulesets for network intrusion detection systems 20