AbertayMachineLearningGroup / network-threats-taxonomyLinks
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
☆105Updated 5 years ago
Alternatives and similar repositories for network-threats-taxonomy
Users that are interested in network-threats-taxonomy are comparing it to the libraries listed below
Sorting:
- A collection of resources for security data☆41Updated 8 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 4 months ago
- An anomaly-based intrusion detection system.☆85Updated 3 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆143Updated 6 years ago
- ICS Cybersecurity PCAP respository☆62Updated 6 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆165Updated last month
- This is a paper list about Machine Learning for IDSes☆90Updated last year
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆67Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Machine Learning for Computer Security☆280Updated 3 years ago
- Collection of cyber security and "AI" relevant topics☆73Updated 7 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆69Updated 2 years ago
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆40Updated 9 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 5 years ago
- Pcap Converter: convert pcap to text or flows.☆49Updated 5 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 7 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Machine-learning-based intrusion detection☆38Updated 7 years ago
- Free Malware Training Datasets for Machine Learning☆237Updated 4 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆53Updated 2 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆133Updated 10 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆222Updated 8 years ago
- NSL-KDD Dataset☆197Updated 10 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 6 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 3 years ago
- ☆127Updated 5 years ago
- An IDS implementation using machine learning☆38Updated 8 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- ☆297Updated last year
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆72Updated 2 years ago