The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14May 16, 2021Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆56May 15, 2025Updated 11 months ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Vanilla, Convolutional, VAE, Conditional VAE☆20Dec 20, 2018Updated 7 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆59Dec 30, 2025Updated 4 months ago
- On Robustness of Neural Ordinary Differential Equations☆11Oct 12, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆17Jul 8, 2024Updated last year
- This repository implements various Search Based (Heuristic and Incremental) and Sampling Based (Multi Query and Single Query) motion plan…☆16May 28, 2023Updated 2 years ago
- EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection☆18Jan 6, 2025Updated last year
- The application describes how data can be stored, structured and read out on a local OPC UA server built with Node-Red. The data used are…☆13Oct 13, 2023Updated 2 years ago
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆51Aug 2, 2019Updated 6 years ago
- cPMML is C++ library for scoring machine learning models serialized with the Predictive Model Markup Language (PMML)☆30Jul 29, 2023Updated 2 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- IoT firmware vulnerability analysis tool based on binary code similarity analysis (BCSA)☆24Jul 6, 2022Updated 3 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆32Jun 29, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆14Mar 2, 2021Updated 5 years ago
- ☆19Nov 21, 2023Updated 2 years ago
- Finetuned Deepseek 8b model for finance reasoning☆17Feb 14, 2025Updated last year
- Implementation of an online learning algorithm to do classification under concept drift☆23Nov 20, 2017Updated 8 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- ☆23Jan 23, 2025Updated last year
- This repo demostrates how to use the concept of contrastive learning in an anommaly detection setting with autoencoders (also know as dis…☆15Oct 25, 2020Updated 5 years ago
- Este é o repositório da participação do IFRN no Hacktoberfest☆16Oct 6, 2020Updated 5 years ago
- Project champion developed for Hackathon RN Digital at the Campus Party Natal-RN 2018.☆10Dec 10, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- Bots for the board game quoridor implemented using four algorithms: minimax, minimax with alpha beta pruning, expectimax and monte carlo …☆13Sep 28, 2024Updated last year
- Python client and module for Vulnerability-Lookup.☆16Apr 28, 2026Updated last week
- unofficial patches for IDA 7.5 demo on linux☆33Dec 17, 2023Updated 2 years ago
- What if all Covid‑19 deaths in Brazil happened in your neighborhood?☆16Dec 4, 2025Updated 5 months ago
- This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and H…☆23Jun 26, 2023Updated 2 years ago
- Scripts que fazem o processamento de dados do input do usuário☆16Jan 12, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Unofficial implementation of "Remembering Normality: Memory-guided Knowledge Distillation for Unsupervised Anomaly Detection"☆23Jun 18, 2025Updated 10 months ago
- External telegram feeder for AIL framework☆19Jan 21, 2026Updated 3 months ago
- ☆21Dec 22, 2021Updated 4 years ago
- vs code extension to swap things☆15Dec 11, 2019Updated 6 years ago
- ☆13Dec 27, 2019Updated 6 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 3 years ago
- CVE-2022-2185 poc☆13Jul 12, 2022Updated 3 years ago