This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-attacks) in SCADA water infrastructure.
☆38Sep 11, 2020Updated 5 years ago
Alternatives and similar repositories for machine-learning-SIEM-water-infrastructure
Users that are interested in machine-learning-SIEM-water-infrastructure are comparing it to the libraries listed below
Sorting:
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- SCADA network attack datasets and process logs☆20May 2, 2017Updated 8 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆13Jul 10, 2024Updated last year
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- ☆16Jul 26, 2023Updated 2 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆53Aug 10, 2023Updated 2 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- Some games written in WinCC and VBScript for Siemens Industrial HMIs☆29Oct 6, 2023Updated 2 years ago
- Snort rules☆11Oct 22, 2015Updated 10 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- ☆14Apr 20, 2024Updated last year
- ICS/SCADA nmap script.☆18May 17, 2018Updated 7 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- Masters of IT project, network attacks against Profinet SCADA systems.☆32Sep 15, 2016Updated 9 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆199Apr 21, 2023Updated 2 years ago
- This repository implements the GAT-LSTM model, which combines Graph Attention Networks (GAT) and Long Short-Term Memory Networks (LSTM) f…☆24Sep 22, 2025Updated 6 months ago
- ☆10May 29, 2024Updated last year
- 使用K-Nearest Neighbors进行DoS / DDoS检测:☆10Mar 21, 2019Updated 7 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆28Feb 23, 2026Updated 3 weeks ago
- ☆16Aug 30, 2023Updated 2 years ago
- A Simple python script for detection Potential DDoS Attacks☆13Feb 6, 2023Updated 3 years ago
- PSO feature selection improves classifier performance. Implemented in Jupyter Notebook with pandas, numpy, scikit-learn. PSO done from sc…☆12Jan 30, 2023Updated 3 years ago
- Insurance claim fraud detection using machine learning algorithms.☆12May 6, 2020Updated 5 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Simulations for SCADA systems☆30Jul 24, 2012Updated 13 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆237Nov 16, 2022Updated 3 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- Modbus Dataset from CSET 2016☆49Mar 31, 2023Updated 2 years ago
- ICS Cybersecurity PCAP respository☆63Jan 30, 2019Updated 7 years ago
- A system which has a real-time & light-weight anomaly detection algorithm based on streaming data from UAV sensors in to order to get the…☆14Jan 3, 2020Updated 6 years ago