rubiruchi / Insider-Threat-and-Anomaly-Detection-from-User-ActivitiesLinks
Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)
☆70Updated 6 years ago
Alternatives and similar repositories for Insider-Threat-and-Anomaly-Detection-from-User-Activities
Users that are interested in Insider-Threat-and-Anomaly-Detection-from-User-Activities are comparing it to the libraries listed below
Sorting:
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆226Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆209Updated last year
- Insider threat detection via bert☆20Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated 2 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆26Updated 3 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Feature extraction for CERT insider threat test dataset☆97Updated 10 months ago
- A machine learning based Intrusion Detection System☆145Updated 5 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆26Updated 3 years ago
- Machine Learning in Cybersecurity☆86Updated 3 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆42Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆94Updated 2 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆54Updated 3 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆281Updated last year
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆90Updated 5 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆160Updated 5 years ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆69Updated 2 months ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆156Updated 2 weeks ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Updated 9 months ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆160Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 5 years ago
- ☆119Updated 5 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆70Updated 2 years ago
- Network traffic classifier based on machine learning algorithms☆44Updated 3 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆21Updated 4 years ago
- Public datasets to help you address various cyber security problems.☆447Updated 3 years ago
- Machine-learning-based intrusion detection☆39Updated 7 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆26Updated last year
- CICIDS2017 dataset☆71Updated 3 years ago