The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14May 16, 2021Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆55May 15, 2025Updated 10 months ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Vanilla, Convolutional, VAE, Conditional VAE☆20Dec 20, 2018Updated 7 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆59Dec 30, 2025Updated 2 months ago
- On Robustness of Neural Ordinary Differential Equations☆11Oct 12, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆17Jul 8, 2024Updated last year
- This repository implements various Search Based (Heuristic and Incremental) and Sampling Based (Multi Query and Single Query) motion plan…☆16May 28, 2023Updated 2 years ago
- The application describes how data can be stored, structured and read out on a local OPC UA server built with Node-Red. The data used are…☆12Oct 13, 2023Updated 2 years ago
- EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection☆18Jan 6, 2025Updated last year
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆50Aug 2, 2019Updated 6 years ago
- cPMML is C++ library for scoring machine learning models serialized with the Predictive Model Markup Language (PMML)☆30Jul 29, 2023Updated 2 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- IoT firmware vulnerability analysis tool based on binary code similarity analysis (BCSA)☆23Jul 6, 2022Updated 3 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Jun 29, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Mar 2, 2021Updated 5 years ago
- ☆19Nov 21, 2023Updated 2 years ago
- Finetuned Deepseek 8b model for finance reasoning☆18Feb 14, 2025Updated last year
- Implementation of an online learning algorithm to do classification under concept drift☆23Nov 20, 2017Updated 8 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- ☆22Jan 23, 2025Updated last year
- This repo demostrates how to use the concept of contrastive learning in an anommaly detection setting with autoencoders (also know as dis…☆15Oct 25, 2020Updated 5 years ago
- Este é o repositório da participação do IFRN no Hacktoberfest☆16Oct 6, 2020Updated 5 years ago
- Project champion developed for Hackathon RN Digital at the Campus Party Natal-RN 2018.☆10Dec 10, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- Bots for the board game quoridor implemented using four algorithms: minimax, minimax with alpha beta pruning, expectimax and monte carlo …☆13Sep 28, 2024Updated last year
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 3 months ago
- unofficial patches for IDA 7.5 demo on linux☆33Dec 17, 2023Updated 2 years ago
- What if all Covid‑19 deaths in Brazil happened in your neighborhood?☆16Dec 4, 2025Updated 3 months ago
- This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and H…☆23Jun 26, 2023Updated 2 years ago
- Scripts que fazem o processamento de dados do input do usuário☆16Jan 12, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Unofficial implementation of "Remembering Normality: Memory-guided Knowledge Distillation for Unsupervised Anomaly Detection"☆23Jun 18, 2025Updated 9 months ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago
- ☆21Dec 22, 2021Updated 4 years ago
- vs code extension to swap things☆15Dec 11, 2019Updated 6 years ago
- ☆13Dec 27, 2019Updated 6 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago