Skip to content

Find relevant incidents, logs, events, and alerts to all of your incidents. [Attack Flow & Root Cause Discovery - NO LLMs, NO Queries, Just Explainable Machine Learning]

License

Notifications You must be signed in to change notification settings

ezzeldinadel/attack_flow_detector

Repository files navigation

🛡️ Attack Flow Detector

Find the MITRE ATT&CK flows sneakily hiding in your alerts, by making contextual groupings, then finding causal sequences.


GitHub issues GitHub forks

🔍 Overview

Attack Flow Detector is a Python-based tool designed to analyze security alerts and identify potential attack patterns based on the MITRE ATT&CK framework. By correlating events, it aims to uncover stealthy attack flows that might otherwise go unnoticed.

🚀 Features

  • Correlation Analysis: Detects relationships between seemingly unrelated alerts.
  • MITRE ATT&CK Mapping: Aligns detected patterns with known ATT&CK techniques.
  • Modular Design: Easily extendable to incorporate additional data sources or detection logic.

⚙️ Installation

  1. Clone the repository:

    git clone https://github.com/ezzeldinadel/attack_flow_detector.git
    cd attack_flow_detector
  2. Set up a virtual environment (optional but recommended):

python3 -m venv venv
source venv/bin/activate  # On Windows: venv\Scripts\activate
  1. Install dependencies:
pip install -r requirements.txt

🛠️ Contributing

Contributions are welcome! Please fork the repository and submit a pull request.

📄 License

This project is licensed under the MIT License. See the LICENSE file for details.

📬 Contact

For questions or suggestions, please open an issue on the GitHub repository.

Relevant tools:-

About

Find relevant incidents, logs, events, and alerts to all of your incidents. [Attack Flow & Root Cause Discovery - NO LLMs, NO Queries, Just Explainable Machine Learning]

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published