This is a paper list about Machine Learning for IDSes
☆91Aug 27, 2024Updated last year
Alternatives and similar repositories for AI-Security
Users that are interested in AI-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- source code for USENIX Security paper xNIDS☆60Aug 27, 2024Updated last year
- IoT Security Reading List☆62Apr 6, 2020Updated 5 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆373Apr 14, 2024Updated last year
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- KitNET is a lightweight online anomaly detection algorithm, which uses an ensemble of autoencoders.☆253Mar 28, 2024Updated last year
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- ☆269Aug 25, 2018Updated 7 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆295Dec 22, 2023Updated 2 years ago
- Here, we open source our measurement dataset and source code on IFTTT☆11Oct 23, 2018Updated 7 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- Machine Learning and Datasets for Malwares Static Analysis.☆19Jul 29, 2022Updated 3 years ago
- RARE for P4Lang bmv2 dataplane target☆30Feb 6, 2026Updated last month
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆73Mar 25, 2023Updated 3 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆24Oct 16, 2020Updated 5 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Jun 10, 2020Updated 5 years ago
- Deep Learning models for network traffic classification☆763Jan 30, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Jan 7, 2021Updated 5 years ago
- libdft for win☆51Jul 8, 2013Updated 12 years ago
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,524Oct 1, 2020Updated 5 years ago
- Collected dataset of DGA domains and Alexa domains. Used for experiments in automatic DGA domains classification.☆20Apr 16, 2022Updated 3 years ago
- helper functions for processing and integrating visual language information with Qwen-VL Series Model☆17Aug 30, 2024Updated last year
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆31Apr 7, 2019Updated 6 years ago
- High level language for describing protocol parsers.☆76Oct 10, 2025Updated 5 months ago
- Security papers about software vulnerabilities and exploits☆14Jan 16, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 使用simulink进行环境的模拟,使用python编写强化学习(rl)代码☆23Jul 31, 2019Updated 6 years ago
- Reducing P4 Language’s Voluminosity using Higher-Level Constructs☆15Oct 15, 2022Updated 3 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- ☆14Aug 3, 2020Updated 5 years ago
- Reinforcement Learning for Anomaly Detection☆46Feb 25, 2018Updated 8 years ago
- Machine Learning For Cybersecurity.☆71Nov 9, 2019Updated 6 years ago
- Windows平台下的细粒度污点分析工具☆49Mar 16, 2017Updated 9 years ago