AbertayMachineLearningGroup / network-threats-taxonomyLinks
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
☆104Updated 4 years ago
Alternatives and similar repositories for network-threats-taxonomy
Users that are interested in network-threats-taxonomy are comparing it to the libraries listed below
Sorting:
- A collection of resources for security data☆41Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Machine-learning-based intrusion detection☆37Updated 6 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 10 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆79Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆80Updated 9 months ago
- An IDS implementation using machine learning☆35Updated 7 years ago
- Collection of cyber security and "AI" relevant topics☆74Updated 7 years ago
- This program allow you to extract some features from pcap files.☆38Updated 2 years ago
- This is a paper list about Machine Learning for IDSes☆89Updated 9 months ago
- Machine Learning Models to Detect and Classify Malicious URLs☆52Updated 2 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆68Updated 4 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆153Updated 6 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆156Updated last year
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆89Updated 5 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆140Updated 6 years ago
- Pcap Converter: convert pcap to text or flows.☆49Updated 5 years ago
- ☆52Updated 6 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 2 years ago
- ICS Cybersecurity PCAP respository☆53Updated 6 years ago
- ☆110Updated 4 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆56Updated 4 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi …☆14Updated 5 years ago
- ☆20Updated 9 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 7 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago