A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networks
☆57Mar 16, 2026Updated last month
Alternatives and similar repositories for COMIDDS
Users that are interested in COMIDDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆19Apr 25, 2025Updated last year
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 5 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- ☆12Mar 25, 2026Updated last month
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- A framework for synthesizing lateral movement login data.☆29May 20, 2021Updated 4 years ago
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆90Jan 12, 2026Updated 3 months ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- Code for "Pre-training with Contrastive Learning for Unified Log Analytics"☆21Jan 22, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11May 24, 2022Updated 3 years ago
- A framework for building provenance-based intrusion detection systems with neural networks☆101Apr 28, 2026Updated last week
- Software and Datasets for the publication "Seven Years in the Life of Hypergiants’ Off-Nets" at SIGCOMM 2021.☆15Feb 9, 2022Updated 4 years ago
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆11Nov 19, 2024Updated last year
- ☆31Feb 6, 2025Updated last year
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆53Jan 22, 2026Updated 3 months ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆101Nov 26, 2020Updated 5 years ago
- Single sign-on using SSH key pairs and fine-grained remote command authorization☆16Mar 15, 2024Updated 2 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆42Jun 15, 2020Updated 5 years ago
- about 5G doc and code☆11Jun 14, 2019Updated 6 years ago
- ☆11May 14, 2020Updated 5 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆142Oct 24, 2024Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆103Mar 2, 2026Updated 2 months ago
- ☆13Apr 11, 2026Updated 3 weeks ago
- LogLead performs log loading, log enhancement, log feature engineering, log analysis, log anomaly detection.☆30Feb 17, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆146Mar 25, 2023Updated 3 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆18Mar 12, 2025Updated last year
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- Yet another obfuscated payload generator written in Rust!☆13Feb 9, 2023Updated 3 years ago
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago