☆147Nov 17, 2020Updated 5 years ago
Alternatives and similar repositories for safekit
Users that are interested in safekit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Feature extraction for CERT insider threat test dataset☆108Oct 1, 2024Updated last year
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- ☆17Apr 3, 2020Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 7 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- List of tools & datasets for anomaly detection on time-series data.☆3,167Oct 21, 2024Updated last year
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆24Oct 16, 2020Updated 5 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆102Nov 26, 2020Updated 5 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- Material from the DARPA Transparent Computing Program☆229Apr 29, 2020Updated 5 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- contains the code for models in the paper Robust, Deep and Inductive Anomaly Detection☆36May 25, 2017Updated 8 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- Repository of the paper "A Systematic Evaluation of Deep Anomaly Detection Methods for Time Series".☆597May 25, 2022Updated 3 years ago
- [ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion☆18Nov 20, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Hybrid Isolation Forest☆24Sep 20, 2018Updated 7 years ago
- A framework to implement Machine Learning methods for time series data.☆18Mar 24, 2023Updated 3 years ago
- ☆137Jun 17, 2020Updated 5 years ago
- A collection of anomaly detection methods (iid/point-based, graph and time series) including active learning for anomaly detection/discov…☆874May 22, 2024Updated last year
- A combination of Autoencoder and Robust PCA☆188Jun 28, 2024Updated last year
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- "Self-supervised Log Parsing" submitted for review at ECML-PKDD 2020☆60Jul 6, 2023Updated 2 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- Anomaly detection in time-series networks. Spatio-temporal Anomaly Detection☆12Jan 9, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆18Jun 30, 2022Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Have fun with audit log analysis :)☆155May 5, 2024Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆20Dec 16, 2020Updated 5 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago