Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pipeline of parsing from raw audit logs #2

Open
cmh14 opened this issue Jan 2, 2025 · 0 comments
Open

Pipeline of parsing from raw audit logs #2

cmh14 opened this issue Jan 2, 2025 · 0 comments

Comments

@cmh14
Copy link

cmh14 commented Jan 2, 2025

Hello sir,

Congratulations on the publication of your paper and the open source of your MEGR-APT project. Your research has provided a strong guidance in this field. Here are still a few details that bother us about replicating our code on a non-DARPA dataset (i.e., an APT attack simulation dataset we constructed ourselves).
We collected audit logs from windows process monitors , extracted key information (e.g., filename, ip_address and process names) and realized IOC matching. Unfortunately, we failed to deploy the stardog database locally so that we could not get the specific information of the tll format data you provided. Considering our data size is much more small than DARPA, we are curious if it is possible to complete the remaining pipeline (e.g., Query Graph Construction and Training set construction) without going through the two-step data form transformation (i.e., Postgres and Stardog). If so, which functions or python scripts should we foucs on?
Thank you again for the great help your research has provided, and we will wait for receiving your reply.

Best regards!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant