Asbatel / ContainerHIDS
Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22
☆20Updated last year
Alternatives and similar repositories for ContainerHIDS:
Users that are interested in ContainerHIDS are comparing it to the libraries listed below
- This repository is used to analysis the shared resources of different containers☆28Updated 3 months ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆19Updated 3 months ago
- Have fun with audit log analysis :)☆148Updated 9 months ago
- ☆16Updated 5 months ago
- LID-DS is an intrusion detection data simulation framework.☆46Updated 10 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆45Updated 3 weeks ago
- Usenix Security'23☆13Updated 2 years ago
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- ☆63Updated 5 months ago
- A collection of security papers on top-tier publications☆39Updated this week
- ☆28Updated 3 years ago
- Flow Interaction Graph based attack traffic detection system.☆149Updated 9 months ago
- ☆97Updated 4 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆12Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- A curated list of malware-related papers.☆23Updated 11 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆42Updated last year
- ☆102Updated last year
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆42Updated 11 months ago
- Datasets used in the StreamSpot experiments☆56Updated 9 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆43Updated 3 years ago
- ☆60Updated 2 years ago
- ☆11Updated 5 years ago
- linux kernel event log collector by ebpf☆34Updated 11 months ago
- This repository contains the code for the paper "A flow-based IDS using Machine Learning in eBPF", Contact: Maximilian Bachl☆92Updated 10 months ago
- A deep learning model for localizing bugs in C/C++ source code (USENIX'23)☆144Updated last year
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆66Updated 6 months ago
- ☆14Updated 3 years ago
- FirmSec Dataset☆33Updated 2 years ago