CERT-Naval-Group / Dynamic-Attack-Graph-DAGLinks
☆11Updated 2 years ago
Alternatives and similar repositories for Dynamic-Attack-Graph-DAG
Users that are interested in Dynamic-Attack-Graph-DAG are comparing it to the libraries listed below
Sorting:
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Updated 3 years ago
- Attack graph construction and analysis☆36Updated 6 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Updated 3 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Updated last year
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Updated last year
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆19Updated 2 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆32Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Updated 3 years ago
- 🎈 2020年中国高校计算机大赛(C4)-网络技术挑战赛EP2决赛赛项:基于CNN+LSTM时空神经网络的在线流量分类模型。☆53Updated 2 years ago
- ☆99Updated 2 years ago
- CICIDS2017 dataset☆70Updated 4 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆52Updated 5 years ago
- Machine Learning in Cybersecurity☆90Updated 8 months ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Updated 2 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆195Updated 2 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Updated 6 years ago
- using deep learning to classify the encrypted network traffic☆169Updated 5 years ago
- This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and H…☆23Updated 2 years ago
- ☆152Updated 2 years ago
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆17Updated last year
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆87Updated 11 months ago
- Journal Article: IEEE Access☆17Updated 2 years ago
- 使用卷积神经网络进行网络入侵检测,正确率可达99.5%☆198Updated 6 years ago
- Traffic dataset USTC-TFC2016☆160Updated 6 years ago
- ☆32Updated 5 years ago
- Journal Article: Telematics and Informatics Reports☆11Updated 2 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Updated last year
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆38Updated 5 years ago
- Material from the DARPA Transparent Computing Program☆224Updated 5 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Updated 2 years ago