Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.
☆171Nov 6, 2025Updated 4 months ago
Alternatives and similar repositories for Intrusion-and-anomaly-detection-with-machine-learning
Users that are interested in Intrusion-and-anomaly-detection-with-machine-learning are comparing it to the libraries listed below
Sorting:
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆270Apr 5, 2020Updated 5 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆93Oct 18, 2019Updated 6 years ago
- AI: Autoencoder for HTTP Log Anomaly Detection☆14Jan 20, 2019Updated 7 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆295Dec 22, 2023Updated 2 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Detecting malicious URLs using an autoencoder neural network☆42Oct 9, 2022Updated 3 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- using machine-learning to detecte instruction☆29Oct 21, 2019Updated 6 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 9 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆18Dec 2, 2024Updated last year
- ☆13Jun 15, 2025Updated 8 months ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆222Apr 25, 2024Updated last year
- Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.☆23May 19, 2023Updated 2 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Evading Snort Intrusion Detection System.☆77Sep 18, 2021Updated 4 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Nov 8, 2020Updated 5 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆370Apr 14, 2024Updated last year
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆49Jun 13, 2024Updated last year
- A large collection of system log datasets for AI-driven log analytics [ISSRE'23]☆2,576Updated this week
- From Raw Logs to Real Insights - A tutorial for getting started with log analytics using Elastic Stack.☆29Nov 19, 2020Updated 5 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- A collection of utilities for working with Druid queries☆23Nov 27, 2025Updated 3 months ago
- Analysis and preprocessing of the kdd cup 99 dataset using python and scikit-learn☆22Mar 11, 2020Updated 5 years ago
- Log-based impactful problem identification using machine learning [FSE'18]☆176Jul 6, 2023Updated 2 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆113Oct 31, 2018Updated 7 years ago
- RanSAP: An Open Dataset of Ransomware Storage Access Patterns for Training Machine Learning Models☆28Aug 20, 2024Updated last year
- Network Intrusion Detection System using Deep Learning Techniques☆172Dec 15, 2019Updated 6 years ago
- ☆59Apr 20, 2016Updated 9 years ago
- PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning☆272Aug 19, 2024Updated last year
- A lightweight tool to score network traffic and flag anomalies☆123Aug 7, 2024Updated last year
- stoQ Public Plugins☆71Feb 27, 2023Updated 3 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆28Jun 25, 2019Updated 6 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Source code of the institutional insights TradingView indicator.☆10Jan 30, 2025Updated last year
- ☆132Jun 17, 2020Updated 5 years ago
- Machine Learning For Cybersecurity.☆69Nov 9, 2019Updated 6 years ago