AbertayMachineLearningGroup / network-threats-taxonomyLinks
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
☆105Updated 5 years ago
Alternatives and similar repositories for network-threats-taxonomy
Users that are interested in network-threats-taxonomy are comparing it to the libraries listed below
Sorting:
- ICS Cybersecurity PCAP respository☆57Updated 6 years ago
- A collection of resources for security data☆41Updated 7 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆142Updated 6 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 3 weeks ago
- ☆52Updated 7 years ago
- Machine-learning-based intrusion detection☆39Updated 7 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- This is a paper list about Machine Learning for IDSes☆89Updated last year
- Pcap Converter: convert pcap to text or flows.☆49Updated 5 years ago
- NSL-KDD Dataset☆191Updated 10 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆67Updated 2 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆156Updated 3 weeks ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 8 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆68Updated 4 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆132Updated 10 years ago
- This program allow you to extract some features from pcap files.☆40Updated 2 years ago
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆40Updated 8 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆70Updated 2 years ago
- An IDS implementation using machine learning☆37Updated 8 years ago
- IDS based on Machine Learning technical☆20Updated 6 years ago
- Collection of cyber security and "AI" relevant topics☆73Updated 7 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 5 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- ☆119Updated 5 years ago
- Machine Learning for Computer Security☆280Updated 3 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆66Updated 6 years ago
- Free Malware Training Datasets for Machine Learning☆236Updated 4 years ago
- MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet☆179Updated 2 months ago