17 results for “topic:attack-graph”
Tool for building Kubernetes attack paths
[TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854
A Graph Neural Network-based Intrusion Detection System
Enterprise-grade vulnerability management platform with AI-powered analysis, interactive attack graph visualization (NetworkX), and intelligent chatbot for security consultation. Integrates OpenCTI threat intelligence.
No description provided.
Real-Time Detection of Multi-Stage Attacks using Kill Chain State Machines: Detect multi-stage attacks by correlating alerts from Intrusion Detection Systems (IDS) to generate scenario graphs. By prioritising alerts based on the kill chain model the RT-KCSM reduces false-positive alerts.
No description provided.
Visual IAM attack graph for AWS. Instantly analyze permissions, detect privilege-escalation risks, and audit IAM roles — locally, securely.
Shadow Blade - A tool to interact with attack graphs
Kill-Chain Completion Engine (maps real-world exploit chains, persistence, and lateral movement from packaged artifacts.)
Cascada — A design-time attack path reasoning engine with deterministic, explainable risk scoring.
Graph-based cyber attack propagation and blast radius simulator for enterprise environments. Models lateral movement, privilege escalation, and remediation impact using attack graphs.
Attack graph construction from network topology and vulnerability scans with MITRE ATT&CK mapping and GNN-based risk scoring
AI-powered attack path synthesizer with cross-tool integration — ingest findings from 45+ tools, build knowledge graphs, and synthesize realistic attack paths with MITRE ATT&CK mappings
AI-powered cloud security policy analyzer that detects IAM misconfigurations, policy conflicts, and attack paths using graph reasoning.
🛒 Build an online marketplace with AAPP-MART, a simple yet powerful solution for managing products, users, and transactions seamlessly.
This is the github repo for the Master's thesis of Anushka