anandsagarthumati9848 / HIDSLinks
The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders. Here we are going to build a host based intrusion …
☆14Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆50Updated 3 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆71Updated 3 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆26Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆46Updated 3 years ago
- ☆31Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆203Updated 5 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆94Updated 2 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆85Updated last year
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆50Updated 4 months ago
- a labelled version of the ADFA-LD dataset for HIDS evaluation☆42Updated 6 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆140Updated 2 years ago
- ☆32Updated 5 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆36Updated 3 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- ☆72Updated 6 months ago
- Have fun with audit log analysis :)☆152Updated last year
- ☆27Updated 2 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆53Updated last year
- Malware Classification using Machine learning☆72Updated 9 months ago
- ☆101Updated 4 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Updated 5 years ago
- Dataset with labeled benign and malicious files 🗃️☆133Updated 2 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Updated 2 years ago
- Flow Interaction Graph based attack traffic detection system.☆169Updated last year
- A curated list of malware-related papers.☆31Updated last year
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆32Updated 3 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆166Updated 3 years ago