fkie-cad / COMIDDSView external linksLinks
A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networks
☆49Jan 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for COMIDDS
Users that are interested in COMIDDS are comparing it to the libraries listed below
Sorting:
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆17Apr 25, 2025Updated 9 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Jun 5, 2025Updated 8 months ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆28Jul 9, 2025Updated 7 months ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 3 years ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 2 years ago
- ☆11Feb 6, 2026Updated last week
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- TensorFlow 2 implementation of Wasserstein Conditional GAN with Gradient Penalty (WCGAN-GP) for synthetic data generation☆21Jan 31, 2022Updated 4 years ago
- ☆31Feb 6, 2025Updated last year
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- Crane POAM Automation Tool (C-PAT™)☆15Updated this week
- ☆102Nov 26, 2020Updated 5 years ago
- ☆77Aug 31, 2025Updated 5 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 3 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- ☆86Feb 24, 2025Updated 11 months ago
- A framework for building provenance-based intrusion detection systems with neural networks☆71Updated this week
- A curated list of malware-related papers.☆34Feb 28, 2024Updated last year
- Basic Machine learning projects and assignments done by me.☆33Aug 12, 2020Updated 5 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Decode HikVision device export QR codes.☆16May 5, 2025Updated 9 months ago
- A modular PowerShell-based packaging framework for automated, parameter-driven application deployment. Separates logic and metadata, supp…☆12Oct 29, 2025Updated 3 months ago
- Java decompilation & deobfuscation lab - dockerized toolset☆14Feb 1, 2026Updated 2 weeks ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- ☆22Aug 29, 2025Updated 5 months ago
- Python package for handling CI and other integrations☆10Updated this week
- ☆13Nov 18, 2025Updated 2 months ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year