aswinvisva / dl_log_analysis
Deep Learning Log Analysis using Pytorch
☆9Updated 3 years ago
Alternatives and similar repositories for dl_log_analysis:
Users that are interested in dl_log_analysis are comparing it to the libraries listed below
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆17Updated 4 years ago
- Cyber Anomaly Detection using RNN Language model☆9Updated 6 years ago
- Full pipeline for log analysis and anomaly detection.☆16Updated 5 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆10Updated 3 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- ☆9Updated 7 years ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Updated 4 years ago
- Customs Import Declaration Datasets☆5Updated last year
- Insider Threat Detection using Isolation Forest☆16Updated 6 years ago
- This is about spam classification using HMM model in python language☆19Updated 2 years ago
- Robust Log-Based Anomaly Detection on Unstable Log Data☆19Updated 5 years ago
- Ensemble framework of some log based anomaly detection work.☆36Updated 6 months ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Updated 4 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- ☆11Updated 7 months ago
- sheikhazhanmohammed / Credit-Card-Fraud-Detection-using-Machine-Learning-and-Deep-Learning-Techniques☆9Updated 2 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- detect malicious URL and Request (Bi-LSTM、Bi-LSTM + CNN、CNN + Bi-LSTM、CNN + Bi-LSTM + CNN)☆59Updated 6 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆18Updated 5 years ago
- The final project of deep learning and practice (summer 2020) in NCTU.☆26Updated 2 years ago
- This project has been conducted under the supervision of Dr. Jinoh Kim and Dr. Donghwoon Kwon at Texas A&M University-Commerce. The res…☆17Updated 6 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- An end-to-end event extraction and summarization system.☆21Updated 4 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Updated 2 years ago
- Implementing different RNN models (LSTM,GRU) & Convolution models (Conv1D, Conv2D) on a subset of Amazon Reviews data with TensorFlow on …☆54Updated 5 years ago
- 无线根因分析结合现网历史告警和故障定位工单数据,通过机器学习手段建立故障根因分析模型,快速定位故障原因,大幅提升网络运维效率。☆17Updated 5 years ago
- ☆16Updated 6 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- PDF Malware Parser☆20Updated 8 years ago
- PyTorch implements "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning"☆90Updated last month