aswinvisva / dl_log_analysis
Deep Learning Log Analysis using Pytorch
☆9Updated 3 years ago
Alternatives and similar repositories for dl_log_analysis:
Users that are interested in dl_log_analysis are comparing it to the libraries listed below
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆16Updated 4 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆22Updated 5 years ago
- Cyber Anomaly Detection using RNN Language model☆9Updated 6 years ago
- ☆9Updated 7 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆11Updated 6 years ago
- The final project of deep learning and practice (summer 2020) in NCTU.☆26Updated 2 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Updated 4 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- Insider Threat Detection using Isolation Forest☆16Updated 6 years ago
- This is about spam classification using HMM model in python language☆19Updated 2 years ago
- This project contains files for cyber security☆34Updated 6 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- Full pipeline for log analysis and anomaly detection.☆16Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 5 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆11Updated 5 months ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Updated 4 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆37Updated 4 years ago
- Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification☆12Updated 5 years ago
- detect malicious URL and Request (Bi-LSTM、Bi-LSTM + CNN、CNN + Bi-LSTM、CNN + Bi-LSTM + CNN)☆59Updated 6 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆12Updated 4 years ago
- A Machine Learning approach for classifying a file as Malicious or Legitimate☆76Updated 8 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Updated 6 years ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆32Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆67Updated 4 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago