Coburg Intrusion Detection Data Sets
☆51Oct 25, 2017Updated 8 years ago
Alternatives and similar repositories for CIDDS
Users that are interested in CIDDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for our submission to IEEE CNS 2022☆24Oct 10, 2023Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆51Jul 12, 2024Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆20Oct 21, 2019Updated 6 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Machine Learning Based DDoS Detection (HTTP,UDP,TCP and ICMP Flood Attack)☆10Jul 3, 2018Updated 7 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Nov 8, 2020Updated 5 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- IForestASD for Anomaly Detection in Scikit-MultiFLow☆28Jun 21, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆10Nov 24, 2018Updated 7 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- Port of MIT's xv6 OS to 32 bit RISC V☆12Feb 12, 2023Updated 3 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Dec 4, 2025Updated 3 months ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- Prediction-Based Dual-Weight Switch Migration Scheme for SDN Load Balancing☆10Nov 23, 2021Updated 4 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆55Jun 26, 2024Updated last year
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- 使用LSTM预测回归问题,使用注意力机制自动提取特征的重要程度。Using LSTM to predict regression problems, Attention mechanism is used to automatically extract the impor…☆18Aug 30, 2020Updated 5 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆195Sep 3, 2023Updated 2 years ago
- Deep Reinforcement Learning for Keras.☆11May 23, 2022Updated 3 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers without Shodan Api☆14May 5, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Aug 7, 2025Updated 7 months ago
- The work in paper "An AI-based Traffic Matrix Prediction Solution for Software-Defined Network" - Duc-Huy LE, Hai Anh TRAN, Sami SOUIHI, …☆45Oct 21, 2021Updated 4 years ago
- Applied data science in cyber security☆23Mar 21, 2022Updated 4 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆133May 1, 2015Updated 10 years ago
- Word2Vec embeddings over packet capture data n-grams.☆20Mar 24, 2023Updated 3 years ago
- ☆27Jul 1, 2016Updated 9 years ago
- ☆19Mar 29, 2018Updated 7 years ago