anandsagarthumati9848 / HIDS
The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14Updated 3 years ago
Alternatives and similar repositories for HIDS:
Users that are interested in HIDS are comparing it to the libraries listed below
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆38Updated 5 years ago
- LID-DS is an intrusion detection data simulation framework.☆48Updated last year
- Modbus Dataset from CSET 2016☆47Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆25Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆137Updated 2 years ago
- A Behavior-Based Device Identification Method for the IoT☆54Updated 2 months ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆26Updated 5 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆67Updated 3 weeks ago
- ☆22Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- source code for USENIX Security paper xNIDS☆41Updated 8 months ago
- ☆27Updated last year
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- Material from the DARPA Transparent Computing Program☆190Updated 4 years ago
- ☆35Updated 8 months ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆14Updated 5 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated 8 months ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆47Updated 4 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 7 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- ☆17Updated 4 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆45Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆92Updated last year
- Have fun with audit log analysis :)☆151Updated 11 months ago
- ☆14Updated 4 years ago
- IDS abnormal traffic detection tensorflow☆39Updated 5 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆34Updated 3 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆62Updated 4 years ago