anandsagarthumati9848 / HIDSLinks
The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆51Updated 4 months ago
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆43Updated 6 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆95Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- ☆101Updated 4 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆72Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆205Updated 5 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆36Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆141Updated 2 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆26Updated 3 years ago
- Malware Classification using Machine learning☆72Updated 10 months ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆168Updated 3 years ago
- ☆73Updated 7 months ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆47Updated 3 years ago
- ☆37Updated last year
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆246Updated 3 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆72Updated 3 years ago
- Have fun with audit log analysis :)☆152Updated last year
- Datasets used in the StreamSpot experiments☆61Updated 9 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆91Updated 3 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated last year
- ☆88Updated last year
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆75Updated 4 years ago
- ☆31Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆71Updated 5 months ago
- ☆27Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆85Updated last year
- Modbus Dataset from CSET 2016☆48Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆51Updated 5 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆82Updated last year