Asbatel / ContainerHIDS
Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22
☆22Updated 2 years ago
Alternatives and similar repositories for ContainerHIDS
Users that are interested in ContainerHIDS are comparing it to the libraries listed below
Sorting:
- This repository is used to analysis the shared resources of different containers☆29Updated 6 months ago
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 3 years ago
- Usenix Security'23☆16Updated 2 years ago
- ☆16Updated 8 months ago
- Have fun with audit log analysis :)☆152Updated last year
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆21Updated 6 months ago
- ☆61Updated 2 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆13Updated 2 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆61Updated 3 months ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆32Updated 8 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆22Updated 2 years ago
- ☆66Updated 2 months ago
- eAudit suite for recording provenance-related system calls on Linux☆11Updated last year
- This repository contains the code for the paper "A flow-based IDS using Machine Learning in eBPF", Contact: Maximilian Bachl☆97Updated last year
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆45Updated last year
- ☆11Updated 6 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated last year
- Generates kernel patch for CamFlow Linux Provenance Capture.☆26Updated last year
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆13Updated last year
- ☆15Updated 3 years ago
- ☆26Updated 7 months ago
- ☆18Updated 4 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆26Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- FirmSec Dataset☆34Updated 2 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- TensorFlow API analysis tool and malicious model detection tool☆27Updated 2 months ago
- Policy-Guided Fuzzing for Robotic Vehicles☆33Updated last year
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆70Updated 9 months ago
- ☆14Updated 4 years ago