aiforsec / InsiderThreat
☆13Updated 3 years ago
Alternatives and similar repositories for InsiderThreat:
Users that are interested in InsiderThreat are comparing it to the libraries listed below
- Insider threat detection via bert☆18Updated 3 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆21Updated 3 years ago
- Feature extraction for CERT insider threat test dataset☆89Updated 6 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆63Updated 6 years ago
- Insider Threat Detection using Isolation Forest☆16Updated 6 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 4 months ago
- ☆22Updated 3 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆13Updated 6 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Updated 2 years ago
- Public Arena dataset☆12Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆35Updated 8 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆35Updated 9 months ago
- This is a paper list about Machine Learning for IDSes☆88Updated 7 months ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- ☆20Updated 8 years ago
- ☆27Updated last year
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Updated 3 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 4 years ago
- ☆14Updated 6 years ago
- Datasets used in the StreamSpot experiments☆61Updated 9 years ago
- ☆142Updated 4 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆25Updated 3 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆34Updated 11 months ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆25Updated 3 years ago
- ☆16Updated 4 years ago
- GraphChi's C++ version. Big Data - small machine.☆16Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆121Updated last year
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆43Updated 9 months ago