anandsagarthumati9848 / HIDSLinks
The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆55Updated 8 months ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 4 years ago
- Material from the DARPA Transparent Computing Program☆224Updated 5 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Updated 2 years ago
- ☆83Updated 11 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Updated 2 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆176Updated 3 years ago
- Flow Interaction Graph based attack traffic detection system.☆187Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Updated 3 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection (CHIDS) - CCSW'22☆25Updated 2 years ago
- Have fun with audit log analysis :)☆152Updated last year
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Updated 5 years ago
- Traffic analysis for Tor-based malware detection and classification☆42Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 9 months ago
- ☆102Updated 5 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆54Updated 4 years ago
- Datasets used in the StreamSpot experiments☆66Updated 9 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Updated 3 years ago
- ☆38Updated last year
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆47Updated 6 years ago
- Implementation of "Website Fingerprinting at Internet Scale"☆23Updated 2 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- Machine Learning in Cybersecurity☆90Updated 8 months ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Updated 2 years ago
- A tunneled flooding traffic detection system.☆30Updated last year
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆92Updated 5 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆48Updated last year