A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networks
☆56Mar 16, 2026Updated last month
Alternatives and similar repositories for COMIDDS
Users that are interested in COMIDDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Mar 12, 2026Updated last month
- log data pre processing, generation and shipping in python☆36Apr 10, 2026Updated last week
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆16Apr 19, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆66Nov 19, 2025Updated 4 months ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- A framework for synthesizing lateral movement login data.☆28May 20, 2021Updated 4 years ago
- A framework for building provenance-based intrusion detection systems with neural networks☆92Mar 21, 2026Updated 3 weeks ago
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆22Feb 22, 2025Updated last year
- ☆30Feb 6, 2025Updated last year
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆53Jan 22, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 8 years ago
- ☆102Nov 26, 2020Updated 5 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- Single sign-on using SSH key pairs and fine-grained remote command authorization☆16Mar 15, 2024Updated 2 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆139Oct 24, 2024Updated last year
- ☆11May 14, 2020Updated 5 years ago
- ☆13Apr 3, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Fine-grained open-world Android app fingerprinting