a18499 / KubAnomaly_DataSet
dataSet for kubAnomaly model
☆18Updated last year
Alternatives and similar repositories for KubAnomaly_DataSet:
Users that are interested in KubAnomaly_DataSet are comparing it to the libraries listed below
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆20Updated last year
- This repository contains a curated list of awesome resources related to AISecOps.☆14Updated 3 years ago
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications☆16Updated 10 months ago
- Have fun with audit log analysis :)☆150Updated 10 months ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆156Updated last year
- ☆98Updated 4 years ago
- Material from the DARPA Transparent Computing Program☆190Updated 4 years ago
- LID-DS is an intrusion detection data simulation framework.☆48Updated 10 months ago
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆37Updated 5 years ago
- ☆23Updated 4 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆64Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆33Updated 10 months ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆208Updated 10 months ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- ☆14Updated 4 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆19Updated last year
- ☆63Updated 2 weeks ago
- Usenix Security'23☆14Updated 2 years ago
- This repository is used to analysis the shared resources of different containers☆29Updated 4 months ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆31Updated 6 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆58Updated 9 months ago
- ☆106Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆129Updated 2 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Updated 3 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Awesome materials for software supply chain security☆17Updated 4 years ago
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆13Updated 3 years ago
- ☆21Updated 3 years ago