The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14May 16, 2021Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆55May 15, 2025Updated 9 months ago
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆50Aug 2, 2019Updated 6 years ago
- Vanilla, Convolutional, VAE, Conditional VAE☆20Dec 20, 2018Updated 7 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- On Robustness of Neural Ordinary Differential Equations☆11Oct 12, 2021Updated 4 years ago
- The application describes how data can be stored, structured and read out on a local OPC UA server built with Node-Red. The data used are…☆12Oct 13, 2023Updated 2 years ago
- ☆10Oct 20, 2016Updated 9 years ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 5 months ago
- 遗传算法排课☆14Sep 3, 2019Updated 6 years ago
- Este é o repositório da participação do IFRN no Hacktoberfest☆16Oct 6, 2020Updated 5 years ago
- USTC网络安全实验室网站源码☆11Sep 1, 2022Updated 3 years ago
- Project champion developed for Hackathon RN Digital at the Campus Party Natal-RN 2018.☆10Dec 10, 2022Updated 3 years ago
- WebAssembly as a Fuzzing Compilation Target @ FUZZING'24☆19Feb 13, 2026Updated 3 weeks ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 3 months ago
- ☆13Aug 18, 2025Updated 6 months ago
- ☆12Apr 10, 2022Updated 3 years ago
- vs code extension to swap things☆15Dec 11, 2019Updated 6 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- RISC-V Static Binary Translator☆18Mar 6, 2019Updated 7 years ago
- A compiler of C subset by USTB OWL Wheel Lab.☆13Feb 9, 2023Updated 3 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- Bots for the board game quoridor implemented using four algorithms: minimax, minimax with alpha beta pruning, expectimax and monte carlo …☆13Sep 28, 2024Updated last year
- Enhanced version of the discontinued KShare by @ArsenArsen☆14Jun 5, 2020Updated 5 years ago
- ☆14Aug 17, 2024Updated last year
- ☆16Nov 13, 2023Updated 2 years ago
- A simple example of using Windows Hypervisor Platform (WHP)☆12Dec 18, 2020Updated 5 years ago
- Python module for latest CyberSpace updates.☆16May 26, 2023Updated 2 years ago
- ☆17May 26, 2022Updated 3 years ago
- ☆12Dec 2, 2017Updated 8 years ago
- this☆17Jun 15, 2019Updated 6 years ago
- r2con CTFD themes☆15Dec 23, 2021Updated 4 years ago
- Learn Rust With Entirely Too Many Linked Lists☆15Apr 4, 2021Updated 4 years ago
- A toy implementation about Program Dependence Graph using LLVM☆13Sep 27, 2023Updated 2 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated last month
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Dec 30, 2025Updated 2 months ago
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 5 months ago
- Identify VMess packets in network traffic☆13Nov 21, 2022Updated 3 years ago