A framework for building provenance-based intrusion detection systems with neural networks
☆101Apr 28, 2026Updated last week
Alternatives and similar repositories for PIDSMaker
Users that are interested in PIDSMaker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Orthrus PIDS (USENIX Sec'25) official code☆41Feb 11, 2026Updated 2 months ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆65Aug 26, 2025Updated 8 months ago
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆19Apr 25, 2025Updated last year
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆142Oct 24, 2024Updated last year
- ☆35Jul 21, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆112Aug 23, 2023Updated 2 years ago
- ☆128May 3, 2023Updated 3 years ago
- ☆15Mar 31, 2019Updated 7 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆38Dec 6, 2024Updated last year
- ☆19Nov 27, 2023Updated 2 years ago
- Code for the paper: "Continual Learning with Strategic Selection and Forgetting for Network Intrusion Detection" (Infocom 2025)☆25Aug 28, 2025Updated 8 months ago
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 3 years ago
- Generates kernel patch for CamFlow Linux Provenance Capture.☆29Jan 30, 2024Updated 2 years ago
- ☆18Apr 29, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- UniGen: Enhanced Training & Test-Time Strategies for Unified Multimodal Understanding and Generation☆40Nov 24, 2025Updated 5 months ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆195May 1, 2026Updated last week
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- Training tiny models to prove hard theorems☆77Mar 5, 2026Updated 2 months ago
- A framework for synthesizing lateral movement login data.☆29May 20, 2021Updated 4 years ago
- Multi-scale Signed Recurrence Plot Based Time Series Classification Using Inception Architectural Networks☆10Jul 11, 2023Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- ☆58Nov 6, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11May 3, 2019Updated 7 years ago
- A PyTorch implementation of of Anomal-E.☆44Dec 16, 2022Updated 3 years ago
- ☆87Feb 24, 2025Updated last year
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆48Jan 25, 2026Updated 3 months ago
- ☆11May 24, 2022Updated 3 years ago
- 王道课后习题代码☆10Nov 11, 2022Updated 3 years ago
- Official repository Flash Local Linear Attention☆23Apr 23, 2026Updated 2 weeks ago
- Internal utility libraries for Pkl☆16Apr 24, 2026Updated 2 weeks ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- A framework for streamlining the capture of PANDA execution traces.☆57Jun 16, 2020Updated 5 years ago
- Awesome-Backdoor-on-LMMs is a collection of state-of-the-art, novel, exciting backdoor methods on LMMs (VLPs, TDMs, VLMs, and Agents).☆26Apr 17, 2026Updated 3 weeks ago
- [NeurIPS'25] Backdoor Cleaning without External Guidance in MLLM Fine-tuning☆20Oct 13, 2025Updated 6 months ago
- The end of Screenshot 2023-12-20-21.11.59.png☆15Dec 22, 2023Updated 2 years ago
- Simple and Ideal Circuit Simulation☆13Dec 4, 2017Updated 8 years ago
- Multilingual and Multiculture Benchmark and LLM☆34Apr 23, 2026Updated 2 weeks ago