aswinvisva / dl_log_analysisLinks
Deep Learning Log Analysis using Pytorch
☆9Updated 3 years ago
Alternatives and similar repositories for dl_log_analysis
Users that are interested in dl_log_analysis are comparing it to the libraries listed below
Sorting:
- Cyber Anomaly Detection using RNN Language model☆9Updated 7 years ago
- Full pipeline for log analysis and anomaly detection.☆16Updated 5 years ago
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆17Updated 4 years ago
- Robust Log-Based Anomaly Detection on Unstable Log Data☆20Updated 5 years ago
- ☆9Updated 7 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Updated 6 years ago
- Insider Threat Detection using Isolation Forest☆16Updated 7 years ago
- The final project of deep learning and practice (summer 2020) in NCTU.☆27Updated 3 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 8 months ago
- A Deep Learning model for business process predictions. Preprint on arXiv: https://arxiv.org/abs/2102.07838☆11Updated 4 years ago
- Log anomaly detection model using a CNN with TF-IDF and sliding window feature extraction.☆44Updated 3 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆24Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 8 years ago
- Ensemble framework of some log based anomaly detection work.☆36Updated 9 months ago
- PyTorch implements "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning"☆91Updated 3 weeks ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- ☆17Updated 5 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19Updated 6 years ago
- Here, we open source our measurement dataset and source code on IFTTT☆11Updated 6 years ago
- This is the complementary code repository for the BINet papers.☆27Updated 4 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆17Updated 3 years ago
- Using Unsupervised methods to identify anomalies in user behaviour through IP Profiling☆24Updated 5 years ago
- ☆18Updated 2 years ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆41Updated 3 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆20Updated 7 years ago
- ☆10Updated 4 years ago
- ☆13Updated 3 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆11Updated 4 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago