rubiruchi / Insider-Threat-and-Anomaly-Detection-from-User-ActivitiesLinks
Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)
☆73Updated 6 years ago
Alternatives and similar repositories for Insider-Threat-and-Anomaly-Detection-from-User-Activities
Users that are interested in Insider-Threat-and-Anomaly-Detection-from-User-Activities are comparing it to the libraries listed below
Sorting:
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆214Updated last year
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆234Updated 3 years ago
- Feature extraction for CERT insider threat test dataset☆105Updated last year
- Machine Learning in Cybersecurity☆88Updated 6 months ago
- Network Intrusion Detection System using Deep Learning Techniques☆167Updated 5 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Updated 3 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆290Updated last year
- Detection of network traffic anomalies using unsupervised machine learning☆27Updated 3 years ago
- A machine learning based Intrusion Detection System☆156Updated 5 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆97Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆46Updated last year
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆145Updated 4 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆72Updated 2 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆93Updated 6 years ago
- Extracting Attack Behavior from Threat Reports☆79Updated 2 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆52Updated 2 years ago
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆90Updated 5 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Updated 8 years ago
- Insider threat detection via bert☆22Updated 3 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆65Updated 5 years ago
- CICIDS2017 dataset☆70Updated 3 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Updated 7 years ago
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆104Updated 3 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆184Updated 4 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26Updated 5 years ago
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆46Updated 3 years ago
- This project contains files for cyber security☆36Updated 6 years ago
- DDoS attack analysis using Machine Learning☆46Updated 5 years ago