Reguix / association-analysis
设计实现多规格系统日志关联分析系统,用社交网络来聚类日志,最后生成关联分析报告。
☆8Updated 6 years ago
Alternatives and similar repositories for association-analysis:
Users that are interested in association-analysis are comparing it to the libraries listed below
- Host log detection based on deep learning 基于LSTM神经网络模型的日志异常检测☆89Updated 2 years ago
- ☆25Updated 5 years ago
- ☆12Updated 5 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated 8 months ago
- Applying text model to Detection Task☆73Updated 7 years ago
- 2021 CCF BDCI 数字安全公开赛“基于人工智能的恶意软件家族分类”赛题第二名Petrichor战队解决方案☆20Updated 3 years ago
- Usenix Security'23☆15Updated 2 years ago
- ☆26Updated 6 years ago
- Abnormal Traffic Identification Classifier based on Machine Learning. My code for undergraduate graduation design.☆28Updated 4 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆21Updated 4 years ago
- Implementation of IEEE paper: Malware Classification with Deep Convolutional Neural Networks☆17Updated 5 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Updated 4 years ago
- My codes☆25Updated 7 years ago
- python log parser using "Spell: Streaming Parsing of System Event Logs"☆24Updated 5 years ago
- LogCluster☆33Updated 2 years ago
- 收集了部分将机器学习应用于网络流量分类的论文☆165Updated 4 years ago
- Kaggle微软恶意代码分类☆153Updated 4 years ago
- ☆35Updated 8 months ago
- Malicious domain name detection based on tensorflow☆35Updated 7 years ago
- Ensemble framework of some log based anomaly detection work.☆36Updated 6 months ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆71Updated last year
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆154Updated 2 years ago
- Efficient Log Parsing Using n-Gram Dictionaries☆37Updated 2 years ago
- 利用知识图谱分析网络安全事件☆40Updated 5 years ago
- Datawhale&科大讯飞2021A.I.开发者大赛恶意软件分类CV/NLP/表格三个方向的建模思路+伪标签LGB(rank11)☆11Updated 3 years ago
- ☆14Updated 4 years ago
- ☆11Updated 3 years ago
- a demo for detecting anomaly url☆40Updated 7 years ago
- ☆14Updated 4 years ago