A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networks
☆54Mar 16, 2026Updated last week
Alternatives and similar repositories for COMIDDS
Users that are interested in COMIDDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Mar 12, 2026Updated 2 weeks ago
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆18Apr 25, 2025Updated 11 months ago
- FoGFaaS: Add serverless computing (faas) to ifogsim☆22Mar 30, 2025Updated 11 months ago
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 2 years ago
- GeMU, the generic malware unpacker based on QEMU☆24Mar 16, 2026Updated last week
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆65Nov 19, 2025Updated 4 months ago
- TensorFlow 2 implementation of Wasserstein Conditional GAN with Gradient Penalty (WCGAN-GP) for synthetic data generation☆21Jan 31, 2022Updated 4 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆91Jan 12, 2026Updated 2 months ago
- Code for "Pre-training with Contrastive Learning for Unified Log Analytics"☆20Jan 22, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆12Nov 19, 2024Updated last year
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 2 years ago
- ☆31Feb 6, 2025Updated last year
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆53Jan 22, 2026Updated 2 months ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- ☆17Sep 20, 2019Updated 6 years ago
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 8 years ago
- Academic research rootkit using ftrace-hooking to hide files and processes via magic word or user/group. Tested until Linux 6.11.☆46Jun 5, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Single sign-on using SSH key pairs and fine-grained remote command authorization☆15Mar 15, 2024Updated 2 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆135Oct 24, 2024Updated last year
- ☆11May 14, 2020Updated 5 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆102Mar 2, 2026Updated 3 weeks ago
- ☆12May 7, 2025Updated 10 months ago
- Fine-grained open-world Android app fingerprinting☆15Sep 4, 2022Updated 3 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- LogLead stands for Log Loader, Enhancer, and Anomaly Detector.☆30Feb 17, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated last year
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- ☆76Aug 31, 2025Updated 6 months ago
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- ☆13Apr 6, 2023Updated 2 years ago