Feature extraction for CERT insider threat test dataset
☆107Oct 1, 2024Updated last year
Alternatives and similar repositories for feature-extraction-for-CERT-insider-threat-test-datasets
Users that are interested in feature-extraction-for-CERT-insider-threat-test-datasets are comparing it to the libraries listed below
Sorting:
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- ☆17Apr 3, 2020Updated 5 years ago
- User and Entity Behavior Analytics by deep learning☆120Feb 26, 2021Updated 5 years ago
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 2 years ago
- [ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion☆18Nov 20, 2023Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- ☆58Nov 6, 2023Updated 2 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- This is a boilerplate which has dependencies for pyspark(3.3.0) mongo(>4.x) connectivity☆10May 3, 2024Updated last year
- 此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu☆16Feb 6, 2023Updated 3 years ago
- ☆15Nov 29, 2020Updated 5 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- ☆19Nov 27, 2023Updated 2 years ago
- ☆102Aug 23, 2023Updated 2 years ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆28Jul 9, 2025Updated 8 months ago
- 台大 計算機安全 (交大 程式安全) 2021 Fall☆24Feb 17, 2022Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆31Jan 26, 2024Updated 2 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.☆29Dec 5, 2021Updated 4 years ago
- ☆132Jun 17, 2020Updated 5 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- Official repository of the paper "Interpretable Anomaly Detection with DIFFI: Depth-based Isolation Forest Feature Importance", M. Carlet…☆30Aug 7, 2024Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated 2 months ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- Packet Construction Set☆10Nov 20, 2017Updated 8 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago