anandsagarthumati9848 / HIDSLinks
The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below
Sorting:
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆39Updated 5 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆138Updated 2 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- ☆67Updated 3 months ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆34Updated 3 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆25Updated 3 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆81Updated last year
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- ☆32Updated 4 years ago
- Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
- Malware Classification using Machine learning☆71Updated 6 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆67Updated last year
- ☆26Updated 6 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆67Updated 2 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 2 years ago
- LID-DS is an intrusion detection data simulation framework.☆49Updated 3 weeks ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆51Updated 3 years ago
- ☆30Updated 2 years ago
- Modbus Dataset from CSET 2016☆47Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆46Updated last month
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆72Updated 3 years ago
- ☆83Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆52Updated last year
- Usenix Security'23☆16Updated 2 years ago
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆44Updated last month
- Datasets used in the StreamSpot experiments☆60Updated 9 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆241Updated 3 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 4 years ago