All Projects → AbertayMachineLearningGroup → Network Threats Taxonomy

AbertayMachineLearningGroup / Network Threats Taxonomy

Licence: gpl-3.0
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies

Projects that are alternatives of or similar to Network Threats Taxonomy

Habu
Hacking Toolkit
Stars: ✭ 635 (+703.8%)
Mutual labels:  networking, network-analysis, hacking, security-tools
W5
Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+364.56%)
Mutual labels:  hacking, security-tools, security-automation
Taipan
Web application vulnerability scanner
Stars: ✭ 359 (+354.43%)
Mutual labels:  hacking, security-tools, security-automation
Pig
A Linux packet crafting tool.
Stars: ✭ 384 (+386.08%)
Mutual labels:  networking, network-analysis, hacking
Recsech
Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (+118.99%)
Mutual labels:  research, security-tools, security-vulnerability
Soteria
Plugin to block compilation when unapproved dependencies are used or code styling does not comply.
Stars: ✭ 36 (-54.43%)
Mutual labels:  security-vulnerability, security-automation, security-tools
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-21.52%)
Mutual labels:  hacking, security-tools, security-vulnerability
Rustscan
🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+6505.06%)
Mutual labels:  networking, hacking, security-tools
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+422.78%)
Mutual labels:  hacking, security-vulnerability, tool
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+11094.94%)
Mutual labels:  security-tools, security-automation, security-vulnerability
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+440.51%)
Mutual labels:  hacking, security-tools, tool
Zbn
安全编排与自动化响应平台
Stars: ✭ 201 (+154.43%)
Mutual labels:  hacking, security-tools, security-automation
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+130.38%)
Mutual labels:  hacking, security-tools, security-vulnerability
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+4356.96%)
Mutual labels:  hacking, security-tools, security-vulnerability
H1domains
HackerOne "in scope" domains
Stars: ✭ 223 (+182.28%)
Mutual labels:  security-tools, security-automation, security-vulnerability
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+422.78%)
Mutual labels:  network-analysis, hacking, security-tools
Goby
Attack surface mapping
Stars: ✭ 446 (+464.56%)
Mutual labels:  networking, hacking, security-tools
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+867.09%)
Mutual labels:  networking, hacking, security-tools
Shellshockhunter
It's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-34.18%)
Mutual labels:  hacking, security-tools
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+1177.22%)
Mutual labels:  hacking, security-tools

Network Threats And Tools Taxonomy

Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies "A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets” and “A Taxonomy of Malicious Traffic for Intrusion Detection Systems”, classifying threats as well as evaluating current datasets. The result shows that a large portion of current research published train IDS algorithms against outdated datasets and outdated threats. To this end, we provide the source of our threat taxonomy, allowing other researchers to contribute and modify it.

The taxonomy is a collaboration between Abertay University, The University of Strathclyde, The Naval Academy Research Institute and Middlesex University (Mauritius Campus)

Taxonomy Structure

The taxonomy classifies each network threat according to:

  • Its Source (i.e. Networking, Host, Software, Hardware, Human)
  • OSI Layer
  • Active / Passive

Prerequisites for a push request

Ensure that the latex source compiles correctly

Manuscript & Citations

The final version of our manuscript is published in IEEE Access Jounral. The paper "A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems" can be found here.

We have released a pre-print of our article on Arxiv, it includes the original taxonomies in a paper called "A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets". The paper can be found here.

If you want to cite the paper please use the following format;

@ARTICLE{9108270,  
	author={H. {Hindy} and D. {Brosset} and E. {Bayne} and A. {Seeam} and C. {Tachtatzis} and R. {Atkinson} and X. {Bellekens}},  
	journal={IEEE Access},   
	title={A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems},   
	year={2020},  
	volume={},  
	number={},  
	pages={1-1},}

Contributors

  • Hanan Hindy
  • Dr Xavier Bellekens

Samples from taxonomy

  • Threats

The threats are organised using the 7 layers of the OSI Models as shown below.

Taxonomy_1 Taxonomy_2 Taxonomy_3

  • Tools

The Threats are then associated with the tools used to carry the attacks.

Tools

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].