lizitong67 / OSPF_Attack_and_DetectionLinks
☆10Updated 4 years ago
Alternatives and similar repositories for OSPF_Attack_and_Detection
Users that are interested in OSPF_Attack_and_Detection are comparing it to the libraries listed below
Sorting:
- Have fun with audit log analysis :)☆152Updated last year
- Some personal work on DARPA TC engagement5☆18Updated 2 years ago
- This repository stores my learning journey and write-ups throughout the security blue team's Blue Team Junior Analyst Certification☆12Updated last year
- Public datasets to help you address various cyber security problems.☆446Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆49Updated 3 months ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated 11 months ago
- ☆72Updated 5 months ago
- The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in rea…☆302Updated 4 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆77Updated last year
- ☆118Updated 2 years ago
- An overview of LLMs for cybersecurity.☆1,004Updated 3 months ago
- some prompt about cyber security☆229Updated 2 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆53Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆199Updated 5 years ago
- ☆89Updated last year
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆11Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆82Updated 2 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆116Updated 9 months ago
- Project created to practice SDN-based Attack & Defence on Modbus/TCP and HTTP protocols in an ICS network.☆19Updated 2 years ago
- Indicators of Compromise (IOCs) from malware or suspicious network traffic☆58Updated 2 weeks ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆131Updated 6 months ago
- The repository of VulnBot: Autonomous Penetration Testing for A Multi-Agent Collaborative Framework.☆88Updated 4 months ago
- ☆56Updated last year
- System traces dataset generation tool.☆13Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆71Updated last year
- A logic-based enterprise network security analyzer☆126Updated 2 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆26Updated last year
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17Updated 4 years ago
- ☆26Updated last year
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆166Updated 2 years ago