A framework for building provenance-based intrusion detection systems with neural networks
☆75Mar 3, 2026Updated this week
Alternatives and similar repositories for PIDSMaker
Users that are interested in PIDSMaker are comparing it to the libraries listed below
Sorting:
- Orthrus PIDS (USENIX Sec'25) official code☆34Feb 11, 2026Updated 3 weeks ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆134Oct 24, 2024Updated last year
- ☆32Jul 21, 2025Updated 7 months ago
- ☆102Aug 23, 2023Updated 2 years ago
- ☆14Mar 31, 2019Updated 6 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆92May 15, 2024Updated last year
- ☆123May 3, 2023Updated 2 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆62Aug 26, 2025Updated 6 months ago
- Code for the paper: "Continual Learning with Strategic Selection and Forgetting for Network Intrusion Detection" (Infocom 2025)☆21Aug 28, 2025Updated 6 months ago
- Training tiny models to prove hard theorems☆41Feb 15, 2026Updated 2 weeks ago
- ☆19Nov 27, 2023Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- ☆132Jun 17, 2020Updated 5 years ago
- Generates kernel patch for CamFlow Linux Provenance Capture.☆29Jan 30, 2024Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- Material from the DARPA Transparent Computing Program☆227Apr 29, 2020Updated 5 years ago
- ☆13Jan 14, 2026Updated last month
- Multi-scale Signed Recurrence Plot Based Time Series Classification Using Inception Architectural Networks☆10Jul 11, 2023Updated 2 years ago
- MLX Implementation of Recursive Reasoning with Tiny Networks☆78Oct 11, 2025Updated 4 months ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- A framework aiming to bridge fast robot prototyping, predefined motion primitives, heterogeneous teleoperation, data collection, and flex…☆22Updated this week
- Internal utility libraries for Pkl☆15Updated this week
- A Graph Rewriting Tool for Plot Generation, uses Graph Grammars☆11Mar 3, 2014Updated 12 years ago
- LEMMA: Logical Engine for Multi-domain Mathematical Analysis☆27Feb 14, 2026Updated 3 weeks ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- ☆11May 24, 2022Updated 3 years ago
- ☆11May 3, 2019Updated 6 years ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Mar 28, 2024Updated last year
- SPAA'24: PASGAL: Parallel And Scalable Graph Algorithm Library☆11Dec 31, 2025Updated 2 months ago
- Simple and Ideal Circuit Simulation☆13Dec 4, 2017Updated 8 years ago
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆41Apr 23, 2020Updated 5 years ago
- My PhD manuscript LaTeX code and the slides for the defense☆11Feb 2, 2022Updated 4 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- [ICML 2025] Improving Planning of Agents for Long-Horizon Tasks☆24Oct 2, 2025Updated 5 months ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- [ECCV'24] UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening☆10Dec 18, 2025Updated 2 months ago
- ResNet-50 for TsinghuaDog classification☆10Feb 2, 2021Updated 5 years ago