☆147Nov 17, 2020Updated 5 years ago
Alternatives and similar repositories for safekit
Users that are interested in safekit are comparing it to the libraries listed below
Sorting:
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago
- ☆17Apr 3, 2020Updated 5 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 6 years ago
- LogCluster☆33Dec 4, 2022Updated 3 years ago
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Apr 28, 2022Updated 3 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- Datasets used in the StreamSpot experiments☆66Feb 18, 2016Updated 10 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- A collection of anomaly detection methods (iid/point-based, graph and time series) including active learning for anomaly detection/discov…☆872May 22, 2024Updated last year
- ☆132Jun 17, 2020Updated 5 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆23Oct 16, 2020Updated 5 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- Analyzing different stocks listed on the NASDAQ stock market☆13Dec 5, 2020Updated 5 years ago
- High Frequency Time series Anomaly Detection using Self Organizing Maps (SOM) which is based on Competitive Learning a variant of the Neu…☆11Jul 16, 2018Updated 7 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- A combination of Autoencoder and Robust PCA☆188Jun 28, 2024Updated last year
- ☆14Dec 8, 2022Updated 3 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- ☆29Sep 14, 2018Updated 7 years ago
- A recommender system for GitHub repositories☆14Jun 21, 2014Updated 11 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- Trending Research Topics In Cybersecurity☆20Jul 16, 2020Updated 5 years ago
- Implementation of Kohonen SOM for anomaly detection purposes.☆28Apr 25, 2024Updated last year
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- SOTA TAG Parser☆15Jan 19, 2019Updated 7 years ago
- CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection☆16Sep 30, 2023Updated 2 years ago
- ☆15Jan 21, 2021Updated 5 years ago
- 记录我的安全学术学习☆129Dec 15, 2020Updated 5 years ago
- KitNET is a lightweight online anomaly detection algorithm, which uses an ensemble of autoencoders.☆252Mar 28, 2024Updated last year
- Source code for 'Docker for Data Science' by Joshua Cook☆36Sep 5, 2017Updated 8 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- ☆18Jun 30, 2022Updated 3 years ago