☆147Nov 17, 2020Updated 5 years ago
Alternatives and similar repositories for safekit
Users that are interested in safekit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Feature extraction for CERT insider threat test dataset☆110Oct 1, 2024Updated last year
- ☆21May 19, 2016Updated 9 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- ☆16Apr 3, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 7 years ago
- A framework for synthesizing lateral movement login data.☆29May 20, 2021Updated 4 years ago
- LogCluster☆33Dec 4, 2022Updated 3 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- List of tools & datasets for anomaly detection on time-series data.☆3,169Oct 21, 2024Updated last year
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆177Sep 3, 2022Updated 3 years ago
- Datasets used in the StreamSpot experiments☆65Feb 18, 2016Updated 10 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆24Oct 16, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆84Jun 6, 2023Updated 2 years ago
- ☆101Nov 26, 2020Updated 5 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- Material from the DARPA Transparent Computing Program☆237Apr 29, 2020Updated 6 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Repository of the paper "A Systematic Evaluation of Deep Anomaly Detection Methods for Time Series".☆597Apr 13, 2026Updated 3 weeks ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 3 years ago
- [ICANN 2023] Anomaly-Based Insider Threat Detection via Hierarchical Information Fusion☆18Nov 20, 2023Updated 2 years ago
- Hybrid Isolation Forest☆24Sep 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- User and Entity Behavior Analytics by deep learning☆120Feb 26, 2021Updated 5 years ago
- 记录一些有趣的文章☆137Mar 15, 2019Updated 7 years ago
- A collection of anomaly detection methods (iid/point-based, graph and time series) including active learning for anomaly detection/discov…☆873May 22, 2024Updated last year
- A combination of Autoencoder and Robust PCA☆188Jun 28, 2024Updated last year
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- "Self-supervised Log Parsing" submitted for review at ECML-PKDD 2020☆60Jul 6, 2023Updated 2 years ago
- Public Arena dataset☆15Jul 20, 2022Updated 3 years ago
- Anomaly detection in time-series networks. Spatio-temporal Anomaly Detection☆12Jan 9, 2020Updated 6 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆76Apr 6, 2025Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Anomaly detection from OS logs using Transformers implemented with Pytorch.☆20Dec 16, 2020Updated 5 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆99Aug 1, 2023Updated 2 years ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Mar 1, 2019Updated 7 years ago
- High Frequency Time series Anomaly Detection using Self Organizing Maps (SOM) which is based on Competitive Learning a variant of the Neu…☆11Jul 16, 2018Updated 7 years ago