Lab41 / magichourLinks
Security log file challenge
☆28Updated 9 years ago
Alternatives and similar repositories for magichour
Users that are interested in magichour are comparing it to the libraries listed below
Sorting:
- An Exploration into Graph Databases☆28Updated 9 years ago
- Implementation of the Loopy Belief Propagation algorithm for Apache Spark☆41Updated 5 years ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆79Updated 10 years ago
- This site has moved to the ONI organization at https://github.com/Open-Network-Insight☆14Updated 9 years ago
- Ipython notebook that illustrates effectiveness of machine learning algorithms in anomaly detection of netflow data (inbound/outbound DDo…☆78Updated 8 years ago
- Anomaly Detection model uses Spark for training and Spark Streaming for testing☆67Updated 9 years ago
- A project that implements statistical methods for identifying anomalous files☆22Updated 10 years ago
- Aperture-Tiles uses familiar web-based map interactions to allow exploration of arbitrary huge data sets.☆74Updated 2 years ago
- A RESTful web service that runs microtasks across multiple crowds, provides quality control techniques, and is easily extensible.☆52Updated 8 years ago
- Anomaly detection framework @ PayPal☆108Updated 5 years ago
- A simple demonstration of sub-sequence sampling as used for anomaly detection with EKG signals☆102Updated 4 years ago
- Code to allow running BIDMach on Spark including HDFS integration and lightweight sparse model updates (Kylix).☆15Updated 4 years ago
- ☆92Updated 9 years ago
- SociaLite: query language for large-scale graph analysis and data mining☆108Updated 8 years ago
- Lossy Counting and Sticky Sampling implementation for efficient frequency counts on data streams.☆63Updated 9 years ago
- People. Places. Things. Graphs.☆92Updated 10 years ago
- ☆110Updated 8 years ago
- Assessing Source Code Semantic Similarity with Unsupervised Learning☆41Updated 7 years ago
- Code for generating analyses found in "Analyzing Log Analysis: An Empirical Study of User Log Mining" to appear in LISA 2014.☆8Updated 10 years ago
- Sample custom Nifi processor to process tcpdump☆18Updated 9 years ago
- Statitical Anomaly Detector of Internet Traffic (SADIT)☆22Updated 8 years ago
- Spark implementation of the Google Correlate algorithm to quickly find highly correlated vectors in huge datasets☆93Updated 9 years ago
- ☆146Updated 9 years ago
- SAMOA (Scalable Advanced Massive Online Analysis) is an open-source platform for mining big data streams.☆425Updated 9 years ago
- Hadoop, Spark and Storm based anomaly detection implementations for data quality, cyber security, fraud detection etc.☆127Updated last year
- A single docker image that combines Neo4j Mazerunner and Apache Spark GraphX into a powerful all-in-one graph processing engine☆46Updated 5 years ago
- Generates more or less realistic log data for testing simple aggregation queries.☆259Updated last year
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- NOUS: Construction, Querying and Reasoning with Knowledge Graphs☆71Updated 2 years ago
- Spark library for doing exploratory data analysis in a scalable way☆43Updated 9 years ago