Find the MITRE ATT&CK flows sneakily hiding in your alerts, by making contextual groupings, then finding causal sequences.
Attack Flow Detector is a Python-based tool designed to analyze security alerts and identify potential attack patterns based on the MITRE ATT&CK framework. By correlating events, it aims to uncover stealthy attack flows that might otherwise go unnoticed.
- Correlation Analysis: Detects relationships between seemingly unrelated alerts.
- MITRE ATT&CK Mapping: Aligns detected patterns with known ATT&CK techniques.
- Modular Design: Easily extendable to incorporate additional data sources or detection logic.
-
Clone the repository:
git clone https://github.com/ezzeldinadel/attack_flow_detector.git cd attack_flow_detector
-
Set up a virtual environment (optional but recommended):
python3 -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
- Install dependencies:
pip install -r requirements.txt
Contributions are welcome! Please fork the repository and submit a pull request.
This project is licensed under the MIT License. See the LICENSE file for details.
For questions or suggestions, please open an issue on the GitHub repository.