anandsagarthumati9848 / HIDSLinks
The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using current bigdata and machine learning techniques. IDS monitors the system for malicious activity and protects a computer from unauthorized access from intruders.  Here we are going to build a host based intrusion …
☆14Updated 4 years ago
Alternatives and similar repositories for HIDS
Users that are interested in HIDS are comparing it to the libraries listed below
Sorting:
- LID-DS is an intrusion detection data simulation framework.☆51Updated 5 months ago
 - [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆37Updated 3 years ago
 - Original implementation and resources of DeepCASE as in the S&P '22 paper☆96Updated 2 years ago
 - Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
 - Material from the DARPA Transparent Computing Program☆212Updated 5 years ago
 - Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆47Updated 3 years ago
 - 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆35Updated 4 years ago
 - Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
 - ☆31Updated 3 years ago
 - ☆14Updated 4 years ago
 - Feature coded UNSW_NB15 intrusion detection data.☆89Updated 7 years ago
 - ☆26Updated 2 years ago
 - Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Updated 2 years ago
 - ☆101Updated 4 years ago
 - FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆28Updated 3 years ago
 - Datasets used in the StreamSpot experiments☆61Updated 9 years ago
 - Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆89Updated 5 years ago
 - Have fun with audit log analysis :)☆152Updated last year
 - A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆73Updated 3 years ago
 - Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
 - ☆36Updated last year
 - ☆76Updated 8 months ago
 - An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
 - A tunneled flooding traffic detection system.☆29Updated 11 months ago
 - Usenix Security'23☆16Updated 2 years ago
 - The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
 - Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 6 months ago
 - Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
 - A Behavior-Based Device Identification Method for the IoT☆56Updated 8 months ago
 - A method for grouping, clustering, and merging semi-structured alerts☆24Updated 11 months ago