fkie-cad / COMIDDS
A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networks
☆33Updated 2 weeks ago
Alternatives and similar repositories for COMIDDS:
Users that are interested in COMIDDS are comparing it to the libraries listed below
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆149Updated last year
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 3 months ago
- Feature extraction for CERT insider threat test dataset☆87Updated 4 months ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆19Updated 4 months ago
- ☆49Updated 2 months ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆31Updated 9 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆49Updated 2 years ago
- ☆100Updated 4 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 7 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆44Updated 5 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆171Updated last year
- ☆75Updated last year
- ☆21Updated 3 years ago
- Public Arena dataset☆12Updated 2 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆42Updated 2 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- Material from the DARPA Transparent Computing Program☆190Updated 4 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆34Updated 7 months ago
- System traces dataset generation tool.☆12Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆22Updated 3 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆41Updated 7 months ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- ☆102Updated last year
- ☆13Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆64Updated last year
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆40Updated last year
- GraphChi's C++ version. Big Data - small machine.☆16Updated 4 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆22Updated 3 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆79Updated last year