nansunsun / Cybersecurity-incident-prediction-and-discovery-data
☆15Updated 6 years ago
Related projects: ⓘ
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 2 months ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆16Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆15Updated 2 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- Implementation of 《DeepDGA: Adversarially-Tuned Domain Generation and Detection》 arXiv:1610.01969☆27Updated 5 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆14Updated 7 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆16Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- dataset of encrypted network traffic☆10Updated 6 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆19Updated 3 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 5 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆90Updated last year
- This is a paper list about Machine Learning for IDSes☆84Updated 3 weeks ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 5 years ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆30Updated 4 years ago
- The project is to detect malware traffic in TLS flows using ML☆32Updated 4 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆67Updated 3 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆31Updated 4 months ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆15Updated 5 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆33Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆23Updated 2 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆55Updated 5 years ago
- CTI database generator and public dataset☆21Updated 4 years ago
- Corpus of auto-labeled text for the cyber security domain☆88Updated 4 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆18Updated 9 months ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆20Updated 2 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆12Updated 5 years ago
- Insider threat detection via bert☆17Updated 2 years ago
- ☆14Updated 3 years ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆16Updated 3 years ago