Code for the ISSRE-2024 Research Track paper: Leveraging RAG-Enhanced Large Language Model for Semi-Supervised Log Anomaly Detection
☆29Aug 26, 2024Updated last year
Alternatives and similar repositories for LogRAG
Users that are interested in LogRAG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆42Sep 29, 2024Updated last year
- A Simulated Optimal Intrusion Response Game☆21Apr 3, 2022Updated 3 years ago
- ☆55Jul 3, 2024Updated last year
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- Log-based Anomaly Detection with Deep Learning: How Far Are We? (ICSE 2022, Technical Track)☆216Sep 27, 2024Updated last year
- LogLLM: Log-based Anomaly Detection Using Large Language Models (system log anomaly detection)☆182Dec 9, 2025Updated 3 months ago
- ☆58Dec 12, 2023Updated 2 years ago
- Statically built Nix binaries☆17Jan 27, 2020Updated 6 years ago
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- ☆95Nov 6, 2024Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- ☆27Dec 10, 2021Updated 4 years ago
- ☆20Nov 14, 2024Updated last year
- From Task-based to Instruction-based Automated Log Analysis☆22Jan 7, 2025Updated last year
- Python package dependency confusion vulnerability POC. Impact this vulnerability is Remote code execution (RCE)☆12Apr 29, 2025Updated 10 months ago
- Demonstration-Free: Towards More Practical Log Parsing with Large Language Models☆26Jun 17, 2025Updated 9 months ago
- ☆31Feb 6, 2025Updated last year
- Android third-party library Detection☆17Mar 7, 2020Updated 6 years ago
- Practical Root Cause Localization for Microservice Systems via Trace Analysis. IWQoS 2021☆90Apr 3, 2023Updated 2 years ago
- ☆19Dec 30, 2025Updated 2 months ago
- Long Form NLG Generation Based on Large Language Models☆18Jan 31, 2024Updated 2 years ago
- The implementation of multimodal observability data root cause analysis approach Nezha in FSE 2023☆69May 20, 2025Updated 10 months ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- This project process eBPF events into Prometheus metrics via a Go user-space application. A Grafana dashboard is included to visualize Ke…☆14Apr 22, 2025Updated 11 months ago
- Analysis scripts for log data sets used in anomaly detection.☆85Oct 19, 2025Updated 5 months ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- [EMNLP 2024 (Findings)] mABC: multi-Agent Blockchain-inspired Collaboration for root cause analysis in micro-services architecture☆73Dec 31, 2024Updated last year
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated last year
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- Pytorch implementation of paper: Small Pre-trained Language Models Can be Fine-tuned as Large Models via Over-Parameterization.☆12May 18, 2023Updated 2 years ago
- ☆45Jul 10, 2023Updated 2 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter …☆11Nov 4, 2022Updated 3 years ago
- ☆17Mar 22, 2019Updated 7 years ago
- Container Virtual Service☆13Aug 10, 2022Updated 3 years ago
- A Large-scale Evaluation for Log Parsing Techniques: How Far are We? [ISSTA'24]☆136Oct 8, 2025Updated 5 months ago
- The LOCO-Annotations dataset is a specialized extension of the MVTec LOCO dataset, focusing on detecting and analyzing high-level semanti…☆24Sep 23, 2025Updated 6 months ago
- Notebooks with worked examples using DenoisingDiffusion.jl☆11Sep 2, 2023Updated 2 years ago
- This repository contains the dataset developed in paper, "Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles."☆20Feb 2, 2024Updated 2 years ago