rubiruchi / Insider-Threat-and-Anomaly-Detection-from-User-Activities
Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)
☆63Updated 6 years ago
Alternatives and similar repositories for Insider-Threat-and-Anomaly-Detection-from-User-Activities:
Users that are interested in Insider-Threat-and-Anomaly-Detection-from-User-Activities are comparing it to the libraries listed below
- Insider threat detection with heterogeneous graph in CERT dataset.☆20Updated 3 years ago
- Machine Learning in Cybersecurity☆78Updated 5 months ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆204Updated 11 months ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆49Updated last year
- CICIDS2017 dataset☆66Updated 3 years ago
- Insider threat detection via bert☆18Updated 3 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆22Updated 4 years ago
- Deep learning models for network intrusion detection☆35Updated 2 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆102Updated 5 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆25Updated 3 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆154Updated 5 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆61Updated 4 years ago
- Feature extraction for CERT insider threat test dataset☆88Updated 5 months ago
- Network data classifier based on the recurrent neural network.☆22Updated 5 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆87Updated 5 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆47Updated last year
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆25Updated 2 years ago
- DDoS attack analysis using Machine Learning☆41Updated 4 years ago
- A machine learning based Intrusion Detection System☆137Updated 5 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆34Updated 8 months ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆77Updated 4 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Updated 2 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 4 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Updated 6 years ago
- Based on the CICIDS2017 dataset and Pytorch platform☆28Updated 5 years ago
- ☆77Updated last year
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆21Updated 4 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆42Updated last year
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆279Updated last year