A framework for the Analysis of Intrusion Detection Alerts
☆17Nov 11, 2021Updated 4 years ago
Alternatives and similar repositories for AIDA-Framework
Users that are interested in AIDA-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆31Jul 9, 2025Updated 9 months ago
- Follow up to the DREBIN paper☆13Dec 27, 2018Updated 7 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Nov 21, 2023Updated 2 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆10Jan 4, 2024Updated 2 years ago
- A framework for the real-time network traffic analysis based on world-leading technologies for distributed stream processing, network tra…☆102Aug 17, 2021Updated 4 years ago
- 新闻聚合+新闻推荐网站☆10Jun 21, 2017Updated 8 years ago
- A PyTorch implementation of of Anomal-E.☆44Dec 16, 2022Updated 3 years ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Mar 1, 2019Updated 7 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Jun 28, 2024Updated last year
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- A static analysis tool for Java programs, based on the theory of code property graphs.☆20Mar 27, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Graph-Based Procedural Modelling Library☆22Jan 3, 2026Updated 4 months ago
- Material from the DARPA Transparent Computing Program☆234Apr 29, 2020Updated 6 years ago
- Decentralized One Time Passwords☆12Dec 11, 2022Updated 3 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- Code for the paper "Refining Language Model with Compositional Explanation" (NeurIPS 2021)☆11Oct 25, 2021Updated 4 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- ☆13Jul 26, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 我的远程连接一键部署工具。☆10May 4, 2023Updated 2 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Self-Service Semantic Suite (S4)☆18Sep 29, 2016Updated 9 years ago
- An adaptive URL online checker for python2 and python3☆10Aug 10, 2018Updated 7 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Repository of creating different example suricata data sets☆36Jan 2, 2019Updated 7 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆24Aug 13, 2024Updated last year
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆177Sep 3, 2022Updated 3 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆155Jan 24, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Jul 19, 2017Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Apr 10, 2017Updated 9 years ago
- An easy and efficient tool to build sequential recommendation system utilizing SASRec☆10Nov 1, 2023Updated 2 years ago
- 系统巡检脚本☆12Aug 9, 2016Updated 9 years ago
- A Python notebook showcasing the use of Machine Learning for the task of bot detection, with an emphasis on e-commerce sites.☆14Jul 8, 2021Updated 4 years ago
- ☆12Nov 1, 2024Updated last year
- 2018研究生推免计算机类高校夏令营时间安排☆12May 14, 2018Updated 7 years ago