TristanBilot / phishGNNLinks
Phishing detection using GNNs (SECRYPT'22)
☆16Updated 7 months ago
Alternatives and similar repositories for phishGNN
Users that are interested in phishGNN are comparing it to the libraries listed below
Sorting:
- NLP model and tech for cyber security tasks☆86Updated 2 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆49Updated last week
- Public datasets to help you address various cyber security problems.☆463Updated 3 years ago
- PyTorch/HuggingFace Implementation of URLTran: Improving Phishing URL Detection Using Transformers☆37Updated 3 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Updated 2 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆18Updated 3 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆106Updated 6 years ago
- Implementations of 3 phishing detection and identification baselines☆20Updated last year
- Dynaphish: A complementary module for any reference-based phishing detector with BrandKnowledgeExpansion and WebInteraction☆18Updated 4 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆206Updated 2 years ago
- Feature extraction for CERT insider threat test dataset☆106Updated last year
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆81Updated 4 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 5 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Updated 7 months ago
- ☆74Updated 5 months ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆545Updated 8 months ago
- ☆10Updated 3 years ago
- ☆132Updated 5 years ago
- ☆38Updated last year
- DDoS attack analysis using Machine Learning☆47Updated 5 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆48Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆178Updated 2 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆72Updated 2 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 9 months ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆53Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆103Updated 2 years ago
- Network traffic classifier based on machine learning algorithms☆48Updated 3 years ago