lcd-dal / feature-extraction-for-CERT-insider-threat-test-datasetsView external linksLinks
Feature extraction for CERT insider threat test dataset
☆106Oct 1, 2024Updated last year
Alternatives and similar repositories for feature-extraction-for-CERT-insider-threat-test-datasets
Users that are interested in feature-extraction-for-CERT-insider-threat-test-datasets are comparing it to the libraries listed below
Sorting:
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Apr 28, 2022Updated 3 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- ☆147Nov 17, 2020Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 6 years ago
- ☆21May 19, 2016Updated 9 years ago
- Creating a resource to help build and manage an Insider Threat program.☆101Jan 30, 2025Updated last year
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 2 years ago
- [ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion☆18Nov 20, 2023Updated 2 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- ☆58Nov 6, 2023Updated 2 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 2 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- ☆102Aug 23, 2023Updated 2 years ago
- 台大 計算機安全 (交大 程式安全) 2021 Fall☆24Feb 17, 2022Updated 4 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆28Jul 9, 2025Updated 7 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 2 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.☆29Dec 5, 2021Updated 4 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 3 years ago
- ☆132Jun 17, 2020Updated 5 years ago
- Datasets used in the StreamSpot experiments☆66Feb 18, 2016Updated 9 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- Analysis scripts for log data sets used in anomaly detection.☆85Oct 19, 2025Updated 3 months ago
- ☆15Feb 5, 2026Updated last week
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- SimpleNids is a simple network traffic detection system based on libnids. Can effectively detect network packets, including: IP packets, …☆12Nov 29, 2024Updated last year
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated last month
- Base Kafka Producer, consumer, flask api and PySpark Structured streaming Job☆11Oct 20, 2021Updated 4 years ago
- A PyTorch implementation of of Anomal-E.☆41Dec 16, 2022Updated 3 years ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago