lizitong67 / OSPF_Attack_and_Detection
☆9Updated 4 years ago
Alternatives and similar repositories for OSPF_Attack_and_Detection:
Users that are interested in OSPF_Attack_and_Detection are comparing it to the libraries listed below
- A logic-based enterprise network security analyzer☆120Updated 2 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆22Updated last year
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆114Updated 10 months ago
- ☆55Updated last month
- Have fun with audit log analysis :)☆150Updated 10 months ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆109Updated 2 years ago
- ☆64Updated last month
- ☆55Updated 4 months ago
- Material from the DARPA Transparent Computing Program☆190Updated 4 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆33Updated 4 years ago
- Flow Interaction Graph based attack traffic detection system.☆154Updated 10 months ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆36Updated last month
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆323Updated 6 months ago
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆29Updated 9 months ago
- Usenix Security'23☆14Updated 2 years ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆68Updated 8 months ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆64Updated 2 years ago
- ☆22Updated 5 years ago
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆41Updated last year
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆59Updated 10 months ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆62Updated last year
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆127Updated last year
- Data Mining for Cybersecurity☆77Updated 2 years ago
- ☆17Updated 9 months ago
- The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in rea…☆202Updated 3 months ago
- ☆107Updated last year
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆10Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆65Updated last year
- 从pcap获取流的基本信息工具☆211Updated last year
- ☆21Updated last year