seclab-ucr / Themis
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
☆20Updated last year
Alternatives and similar repositories for Themis:
Users that are interested in Themis are comparing it to the libraries listed below
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆67Updated 6 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆42Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- ☆32Updated 7 months ago
- ☆15Updated 3 years ago
- This repository is used to store recording about papers and presentations readed.☆17Updated 6 months ago
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆29Updated 6 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- ☆12Updated 3 years ago
- ☆14Updated 3 years ago
- Additional code and data for the automated malware generation paper☆12Updated 9 months ago
- AI Model Security Reading Notes☆35Updated 6 months ago
- ☆23Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆20Updated 2 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆12Updated last year
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆31Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆52Updated 3 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 4 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆43Updated 3 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated last year
- ☆25Updated 5 months ago
- ☆22Updated 5 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 4 years ago
- Flow Interaction Graph based attack traffic detection system.☆149Updated 9 months ago
- ☆44Updated 2 years ago
- ☆14Updated 4 years ago