{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"logdata-anomaly-miner","owner":"ait-aecid","isFork":false,"description":"This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.","allTopics":["python","linux","log-analysis","detection","logging","cybersecurity","ids","intrusion-detection","hids","anomaly","anomaly-detection","logdata","security"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":12,"issueCount":38,"starsCount":63,"forksCount":22,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-23T08:52:35.325Z"}},{"type":"Public","name":"aminer-ansible","owner":"ait-aecid","isFork":false,"description":"Ansible-Role for the logdata-anomaly-miner","allTopics":["ansible","ansible-role"],"primaryLanguage":null,"pullRequestCount":2,"issueCount":0,"starsCount":3,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-06T15:26:11.097Z"}},{"type":"Public","name":"anomaly-detection-log-datasets","owner":"ait-aecid","isFork":false,"description":"Analysis scripts for log data sets used in anomaly detection.","allTopics":["python","review","machine-learning","hadoop","unsupervised","logs","survey","hdfs","sequences","bgl","anomaly-detection","semi-supervised","log-data"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":20,"forksCount":5,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-24T21:11:53.324Z"}},{"type":"Public","name":"alert-data-set","owner":"ait-aecid","isFork":false,"description":"Scripts to generate and analyze the AIT alert data set (AIT-ADS)","allTopics":["alerts","ids","intrusion-detection","anomaly-detection","attack-graphs","log-data","meta-alerts","alert-correlation","alert-prioritizaion"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-25T11:48:39.257Z"}},{"type":"Public","name":"aecid-alert-aggregation","owner":"ait-aecid","isFork":false,"description":"A method for grouping, clustering, and merging semi-structured alerts","allTopics":["json","machine-learning","alerts","unsupervised","clustering","logs","similarity","ids","intrusion-detection","hids","nids","log-data","alert-aggregation","semi-structured","meta-alerts"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":12,"forksCount":3,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-19T09:57:09.393Z"}},{"type":"Public","name":"kyoushi-environment","owner":"ait-aecid","isFork":false,"description":"Scripts to deploy virtual testbed for log data analysis and anomaly detection.","allTopics":["security","data-mining","monitoring","simulation","logs","ids","hids","nids","anomaly-detection","cyber-attacks","log-data","kyoushi"],"primaryLanguage":{"name":"Jinja","color":"#a52a22"},"pullRequestCount":3,"issueCount":2,"starsCount":14,"forksCount":4,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-21T15:04:40.413Z"}},{"type":"Public","name":"aminer-deep","owner":"ait-aecid","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-28T16:45:29.208Z"}},{"type":"Public","name":"aecid-parsergenerator","owner":"ait-aecid","isFork":false,"description":"Automatically create parser trees for textual logdata to facilitate analysis","allTopics":["python","parser","templates","logs","hdfs","parser-generation","log-data","log-signatures","log-templates"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":3,"starsCount":4,"forksCount":3,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-19T06:15:27.680Z"}},{"type":"Public","name":"count-vector-clustering","owner":"ait-aecid","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-16T13:47:00.297Z"}},{"type":"Public","name":"stide","owner":"ait-aecid","isFork":false,"description":"Evaluation of the stide algorithm on system log data","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-02T09:53:30.129Z"}},{"type":"Public","name":"clue-lds","owner":"ait-aecid","isFork":false,"description":"This repository contains scripts to carry out anomaly detection in the CLUE log data set.","allTopics":["anomaly-detection","ueba","user-behavior-analytics","log-data-analysis"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-30T07:40:47.904Z"}},{"type":"Public","name":"semtech-loratool","owner":"ait-aecid","isFork":false,"description":"This util sends encrypted lorapackets using the semtech udp-protocol to the gateway. ","allTopics":["exploit","lorawan","semtech"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-08-18T10:06:00.984Z"}},{"type":"Public","name":"aminer-amqtt","owner":"ait-aecid","isFork":false,"description":"","allTopics":["mqtt"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-08-18T09:44:08.243Z"}},{"type":"Public","name":"aecid-jsonparsergenerator","owner":"ait-aecid","isFork":false,"description":"Automatically create parser trees for logdata available in JSON format to facilitate analysis ","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-05-27T06:46:40.432Z"}},{"type":"Public","name":"aminer-akafka","owner":"ait-aecid","isFork":false,"description":"Connector to ingest logs from Kafka","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-05-25T09:33:05.805Z"}},{"type":"Public","name":"aecid-template-generator","owner":"ait-aecid","isFork":false,"description":"Create character-based templates for clustered log data","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-05-20T12:16:58.979Z"}},{"type":"Public","name":"alert-aggregation-generator","owner":"ait-aecid","isFork":false,"description":"A generator for alerts and meta-alerts to be displayed in the dashboard","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-04-06T09:22:58.975Z"}},{"type":"Public","name":"ablocker","owner":"ait-aecid","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-04-04T14:59:50.764Z"}},{"type":"Public","name":"aecid-incremental-clustering","owner":"ait-aecid","isFork":false,"description":"An efficient method for clustering log data","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-04-01T09:21:12.501Z"}},{"type":"Public","name":"kyoushi-dataset","owner":"ait-aecid","isFork":false,"description":"Tool for labeling log data from testbeds","allTopics":["kyoushi","dataset"],"primaryLanguage":{"name":"Jinja","color":"#a52a22"},"pullRequestCount":1,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-08T14:41:22.347Z"}},{"type":"Public","name":"kyoushi-generator","owner":"ait-aecid","isFork":false,"description":"Tool to transform testbed models into deployable scripts","allTopics":["kyoushi"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-03T12:23:29.432Z"}},{"type":"Public","name":"alert-aggregation-dashboard","owner":"ait-aecid","isFork":false,"description":"Visualization of alerts and meta-alerts","allTopics":[],"primaryLanguage":{"name":"TypeScript","color":"#3178c6"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-02-23T09:17:02.372Z"}},{"type":"Public","name":"kyoushi-statemachines","owner":"ait-aecid","isFork":false,"description":"User and attacker statemachines for simulation in testbeds","allTopics":["kyoushi"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":5,"starsCount":1,"forksCount":2,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-19T11:21:41.170Z"}},{"type":"Public","name":"kyoushi-simulation","owner":"ait-aecid","isFork":false,"description":"Tool for user and attack simulation","allTopics":["kyoushi"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":3,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-11-04T13:53:21.551Z"}},{"type":"Public","name":"wphashcrack","owner":"ait-aecid","isFork":false,"description":"Tool for WordPress password cracking","allTopics":[],"primaryLanguage":{"name":"Perl","color":"#0298c3"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-09-10T11:21:25.282Z"}},{"type":"Public","name":"aminer-aelastic","owner":"ait-aecid","isFork":false,"description":"Middleware that allows logdata-anomaly-miner to process data from elasticsearch","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":2,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-08-13T15:07:51.152Z"}},{"type":"Public","name":"dictfilter","owner":"ait-aecid","isFork":true,"description":"Filter python dictionaries based on a list of field names.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-08-09T09:46:39.465Z"}},{"type":"Public","name":"aminer-dashboard","owner":"ait-aecid","isFork":false,"description":"Visualization of AMiner anomalies in Kibana dashboard","allTopics":[],"primaryLanguage":{"name":"Jinja","color":"#a52a22"},"pullRequestCount":0,"issueCount":2,"starsCount":2,"forksCount":1,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-06-23T11:34:15.050Z"}},{"type":"Public","name":"aminer-rest","owner":"ait-aecid","isFork":false,"description":"REST-API for the logdata-anomaly-miner","allTopics":[],"primaryLanguage":null,"pullRequestCount":1,"issueCount":4,"starsCount":1,"forksCount":2,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-02-26T11:48:42.062Z"}}],"repositoryCount":29,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}