TPs-ESIR-S9 / PcapFileAnalysisLinks
Malicious Network Traffic Analysis with AI
☆22Updated 2 years ago
Alternatives and similar repositories for PcapFileAnalysis
Users that are interested in PcapFileAnalysis are comparing it to the libraries listed below
Sorting:
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆60Updated 5 months ago
- Transformer Neural Network for Dynamic Malware Detection☆38Updated last week
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆69Updated 2 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- Malicious PowerShell Dataset☆22Updated 2 years ago
- Dataset with labeled benign and malicious files 🗃️☆149Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆206Updated 2 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆257Updated 4 years ago
- 🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Window…☆31Updated last year
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆49Updated 2 weeks ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Updated 2 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆41Updated 2 weeks ago
- ☆44Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆52Updated 2 months ago
- ☆25Updated 4 years ago
- malicious PowerShell script detection model☆41Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆180Updated 2 years ago
- Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC)…☆16Updated 10 months ago
- ☆11Updated 3 years ago
- A logic-based enterprise network security analyzer☆137Updated 3 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆79Updated 8 months ago
- We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environme…☆49Updated 2 weeks ago
- Interactive, dynamic, and realistic LLM honeypots☆73Updated 11 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- ☆37Updated 7 months ago
- Public datasets to help you address various cyber security problems.☆463Updated 3 years ago
- ☆34Updated 5 years ago