This is a paper list about Machine Learning for IDSes
☆91Aug 27, 2024Updated last year
Alternatives and similar repositories for AI-Security
Users that are interested in AI-Security are comparing it to the libraries listed below
Sorting:
- source code for USENIX Security paper xNIDS☆58Aug 27, 2024Updated last year
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- KitNET is a lightweight online anomaly detection algorithm, which uses an ensemble of autoencoders.☆252Mar 28, 2024Updated last year
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆368Apr 14, 2024Updated last year
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- I put all my exploration around AI in reproducible notebooks in this repository☆105Feb 11, 2026Updated 3 weeks ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- An ELF format manipulation library in python☆18Feb 9, 2017Updated 9 years ago
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Jun 10, 2020Updated 5 years ago
- implementation of BiGAN model using tensorflow☆16Oct 2, 2018Updated 7 years ago
- ☆19Jan 17, 2023Updated 3 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- Machine Learning For Cybersecurity.☆69Nov 9, 2019Updated 6 years ago
- Collected dataset of DGA domains and Alexa domains. Used for experiments in automatic DGA domains classification.☆20Apr 16, 2022Updated 3 years ago
- scripts to help beginners program in Bro☆21Aug 10, 2013Updated 12 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 3 years ago
- TensorFlow implementation of several popular Graph Neural Network layers, wrapped with tf.keras.layers.Layer.☆20Aug 25, 2019Updated 6 years ago
- Deep Learning models for network traffic classification☆760Jan 30, 2026Updated last month
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,521Oct 1, 2020Updated 5 years ago
- An implementation for a federated learning environment in python using Keras☆24Jul 17, 2019Updated 6 years ago
- Reconstruct files from QR-code video data☆22Feb 15, 2018Updated 8 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆40Aug 2, 2012Updated 13 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- The most up-to-date list of Turkish ads to block ads on Turkish websites☆21Feb 26, 2026Updated last week
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 2 months ago
- ☆10Aug 4, 2020Updated 5 years ago
- A design automation framework to engineer decision diagrams yourself☆26Feb 25, 2026Updated last week
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago