anandsagarthumati9848 / HIDSLinks
The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆53Updated 6 months ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆37Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆222Updated 5 years ago
- ☆78Updated 9 months ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆97Updated 2 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Updated 2 years ago
- Have fun with audit log analysis :)☆153Updated last year
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆45Updated 6 years ago
- Datasets used in the StreamSpot experiments☆64Updated 9 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆74Updated 3 years ago
- ☆102Updated 5 years ago
- Feature extraction for CERT insider threat test dataset☆105Updated last year
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- ☆37Updated last year
- Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆170Updated 3 years ago
- ☆32Updated 3 years ago
- Malware Classification using Machine learning☆74Updated last year
- ☆15Updated 6 years ago
- An ML framework for building provenance-based intrusion detection systems (USENIX Sec'25)☆45Updated last month
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Updated 8 years ago
- Usenix Security'23☆16Updated 2 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆87Updated last year
- ☆84Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Updated 2 years ago
- ☆11Updated 6 years ago