ubc-provenance / PIDSMakerView external linksLinks
A framework for building provenance-based intrusion detection systems with neural networks
☆71Updated this week
Alternatives and similar repositories for PIDSMaker
Users that are interested in PIDSMaker are comparing it to the libraries listed below
Sorting:
- Orthrus PIDS (USENIX Sec'25) official code☆33Updated this week
- [S&P 2024] Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.☆17Apr 25, 2025Updated 9 months ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆133Oct 24, 2024Updated last year
- ☆14Mar 31, 2019Updated 6 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆91May 15, 2024Updated last year
- ☆123May 3, 2023Updated 2 years ago
- ☆32Jul 21, 2025Updated 6 months ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆33Dec 6, 2024Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 5 months ago
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- SPADE: Support for Provenance Auditing in Distributed Environments☆191Jan 6, 2026Updated last month
- ☆132Jun 17, 2020Updated 5 years ago
- ☆86Feb 24, 2025Updated 11 months ago
- Material from the DARPA Transparent Computing Program☆227Apr 29, 2020Updated 5 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- ☆29Jan 15, 2026Updated last month
- A Graph Rewriting Tool for Plot Generation, uses Graph Grammars☆11Mar 3, 2014Updated 11 years ago
- ☆11May 24, 2022Updated 3 years ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated last year
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆49Jan 23, 2026Updated 3 weeks ago
- Internal utility libraries for Pkl☆15Feb 4, 2026Updated last week
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- ☆11May 3, 2019Updated 6 years ago
- For ACL25 paper "WAFFLE: Multi-Modal Model for Automated Front-End Development" - by Shanchao Liang and Nan Jiang and Shangshu Qian and L…☆11May 28, 2025Updated 8 months ago
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆41Apr 23, 2020Updated 5 years ago
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated last month
- ☆16Feb 17, 2025Updated 11 months ago
- ICSE'22 - Havoc-MAB: Enhancing AFL havoc mutation with Two-layer Multi-Armed Bandit☆12Sep 19, 2022Updated 3 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- Webshell检测数据集,收集了PHP、JSP、ASP的正常开源代码样本以及恶意Webshell样本。可供Webshell检测研究使用。☆17Dec 11, 2023Updated 2 years ago
- ☆13Aug 18, 2025Updated 5 months ago
- ☆20Dec 3, 2025Updated 2 months ago
- ☆26Feb 7, 2026Updated last week
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Quartet II Official Code☆43Feb 2, 2026Updated last week
- ResNet-50 for TsinghuaDog classification☆10Feb 2, 2021Updated 5 years ago
- Caputre the flag with Large Language Models☆26Aug 5, 2025Updated 6 months ago
- Chat4GPT Experiments for Security☆11Mar 27, 2023Updated 2 years ago