The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14May 16, 2021Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆55May 15, 2025Updated 9 months ago
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆50Aug 2, 2019Updated 6 years ago
- Vanilla, Convolutional, VAE, Conditional VAE☆20Dec 20, 2018Updated 7 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- The application describes how data can be stored, structured and read out on a local OPC UA server built with Node-Red. The data used are…☆12Oct 13, 2023Updated 2 years ago
- On Robustness of Neural Ordinary Differential Equations☆11Oct 12, 2021Updated 4 years ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 5 months ago
- ☆10Oct 20, 2016Updated 9 years ago
- USTC网络安全实验室网站源码☆11Sep 1, 2022Updated 3 years ago
- ☆13Aug 18, 2025Updated 6 months ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 3 months ago
- 遗传算法排课☆14Sep 3, 2019Updated 6 years ago
- Project champion developed for Hackathon RN Digital at the Campus Party Natal-RN 2018.☆10Dec 10, 2022Updated 3 years ago
- WebAssembly as a Fuzzing Compilation Target @ FUZZING'24☆19Feb 13, 2026Updated 3 weeks ago
- ☆12Apr 10, 2022Updated 3 years ago
- Este é o repositório da participação do IFRN no Hacktoberfest☆16Oct 6, 2020Updated 5 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- A compiler of C subset by USTB OWL Wheel Lab.☆13Feb 9, 2023Updated 3 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- RISC-V Static Binary Translator☆18Mar 6, 2019Updated 7 years ago
- vs code extension to swap things☆15Dec 11, 2019Updated 6 years ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- Bots for the board game quoridor implemented using four algorithms: minimax, minimax with alpha beta pruning, expectimax and monte carlo …☆13Sep 28, 2024Updated last year
- ☆12Dec 2, 2017Updated 8 years ago
- A toy implementation about Program Dependence Graph using LLVM☆13Sep 27, 2023Updated 2 years ago
- Enhanced version of the discontinued KShare by @ArsenArsen☆14Jun 5, 2020Updated 5 years ago
- ☆14Aug 17, 2024Updated last year
- Python module for latest CyberSpace updates.☆16May 26, 2023Updated 2 years ago
- this☆17Jun 15, 2019Updated 6 years ago
- r2con CTFD themes☆15Dec 23, 2021Updated 4 years ago
- A simple example of using Windows Hypervisor Platform (WHP)☆12Dec 18, 2020Updated 5 years ago
- Learn Rust With Entirely Too Many Linked Lists☆15Apr 4, 2021Updated 4 years ago
- ☆17May 26, 2022Updated 3 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated last month
- ☆16Nov 13, 2023Updated 2 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Dec 30, 2025Updated 2 months ago
- An R-package for distribution-based outlier detection☆21Dec 17, 2024Updated last year
- LibAFL 文档书 简体中文版☆17Mar 16, 2022Updated 3 years ago