H21lab / Anomaly-DetectionLinks
Scripts to help to detect anomalies in pcap file. Anomaly Detection using tensorflow and tshark.
☆84Updated 5 years ago
Alternatives and similar repositories for Anomaly-Detection
Users that are interested in Anomaly-Detection are comparing it to the libraries listed below
Sorting:
- Machine learning plugins for network traffic☆125Updated 2 years ago
- Read and process pcap files using this nifty tool☆43Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 5 months ago
- ☆62Updated 7 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 5 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆167Updated 2 months ago
- Poseidon is a python-based application that leverages software defined networks (SDN) to acquire and then feed network traffic to a numbe…☆430Updated 6 months ago
- Pcap Converter: convert pcap to text or flows.☆49Updated 5 years ago
- An anomaly-based intrusion detection system.☆85Updated 3 years ago
- ICS Cybersecurity PCAP respository☆62Updated 6 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆144Updated 7 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆354Updated 2 years ago
- Collection of cyber security and "AI" relevant topics☆73Updated 8 years ago
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆57Updated 5 years ago
- Machine Learning for Computer Security☆281Updated 4 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆76Updated last year
- ☆70Updated 2 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 8 years ago
- Repository of Bachelor's Major Project on Botnet Detection☆172Updated 7 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆154Updated 6 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 5 years ago
- Tranalyzer generates extended netflow-like flow statistics from large pcap files or extensive ethernet interface measurements. It is inte…☆18Updated 7 years ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆73Updated last year
- NSL-KDD Dataset☆197Updated 10 years ago
- A framework for the real-time network traffic analysis based on world-leading technologies for distributed stream processing, network tra…☆102Updated 4 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆26Updated 3 months ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆451Updated last year
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 5 years ago
- An analytical framework for network traffic and behavioral analytics☆456Updated 3 years ago