Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security
https://github.com/jivoi/awesome-ml-for-cybersecurity
Last synced: about 19 hours ago
JSON representation
-
[↑](#table-of-contents) Books
- Network Anomaly Detection: A Machine Learning Perspective
- Machine Learning and Security: Protecting Systems with Data and Algorithms
- Introduction To Artificial Intelligence For Security Professionals
- Mastering Machine Learning for Penetration Testing
- Malware Data Science: Attack Detection and Attribution
- Data Mining and Machine Learning in Cybersecurity
- Machine Learning and Data Mining for Computer Security
- Mastering Machine Learning for Penetration Testing
- Machine Learning and Data Mining for Computer Security
-
[↑](#table-of-contents) Papers
- Anomalous Payload-Based Network Intrusion Detection
- Dimension Reduction in Network Attacks Detection Systems
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- CAMP – Content Agnostic Malware Protection
- Notos – Building a Dynamic Reputation System for DNS
- Kopis – Detecting malware domains at the upper dns hierarchy
- Pleiades – From Throw-away Traffic To Bots – Detecting The Rise Of DGA-based Malware
- EXPOSURE – Finding Malicious Domains Using Passive DNS Analysis
- Polonium – Tera-Scale Graph Mining for Malware Detection
- Nazca – Detecting Malware Distribution in Large-Scale Networks
- PAYL – Anomalous Payload-based Network Intrusion Detection
- Anagram – A Content Anomaly Detector Resistant to Mimicry Attacks
- Applications of Machine Learning in Cyber Security
- Data Mining для построения систем обнаружения сетевых атак (RUS)
- Выбор технологий Data Mining для систем обнаружения вторжений в корпоративную сеть (RUS)
- Нейросетевой подход к иерархическому представлению компьютерной сети в задачах информационной безопасности (RUS)
- Методы интеллектуального анализа данных и обнаружение вторжений (RUS)
- Dimension Reduction in Network Attacks Detection Systems
- Rise of the machines: Machine Learning & its cyber security applications
- Machine Learning in Cyber Security: Age of the Centaurs
- Automatically Evading Classifiers A Case Study on PDF Malware Classifiers
- Weaponizing Data Science for Social Engineering — Automated E2E Spear Phishing on Twitter
- Machine Learning: A Threat-Hunting Reality Check
- Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
- Practical Secure Aggregation for Privacy-Preserving Machine Learning
- DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
- eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys
- Big Data Technologies for Security Event Correlation Based on Event Type Accounting (RUS)
- Investigation of The Use of Neural Networks for Detecting Low-Intensive Ddоs-Atak of Applied Level (RUS)
- Detecting Malicious PowerShell Commands using Deep Neural Networks
- Machine Learning DDoS Detection for Consumer Internet of Things Devices
- EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Investigation of malicious portable executable file detection on network using supervised learning techniques.
- Machine Learning in Cybersecurity: A Guide
- Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things
- Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
- Hopper: Modeling and Detecting Lateral Movement
- Finding Effective Security Strategies through Reinforcement Learning and Self-Play
- Intrusion Prevention through Optimal Stopping
- Generating Network Intrusion Detection Dataset Based on Real and Encrypted Synthetic Attack Traffic
- Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
- Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Cyber Risk Management: AI-Generated Warnings of Threats (Thesis)
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
- Anomalous Payload-Based Network Intrusion Detection
- A state-of-the-art survey of malware detection approaches using data mining techniques.
-
[↑](#table-of-contents) Tutorials
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Machine Learning for Red Teams, Part 1
- Machine Learning based Password Strength Classification
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Detect Malicious URLs
- Using deep learning to break a Captcha system
- Data mining for network security and intrusion detection
- Applying Machine Learning to Improve Your Intrusion Detection System
- Analyzing BotNets with Suricata & Machine Learning
- fWaf – Machine learning driven Web Application Firewall
- Deep Session Learning for Cyber Security
- DMachine Learning for Malware Detection
- ShadowBrokers Leak: A Machine Learning Approach
- Practical Machine Learning in Infosec - Virtualbox Image and Stuff
- A Machine-Learning Toolkit for Large-scale eCrime Forensics
- Building Machine Learning Models for the SOC
- Detecting Web Attacks With Recurrent Neural Networks
- Machine Learning for Red Teams, Part 1
- Detecting Reverse Shell with Machine Learning
- Обнаружение веб-атак с помощью рекуррентных нейронных сетей (RUS)
- Clear and Creepy Danger of Machine Learning: Hacking Passwords
- Discovering anomalous patterns based on parent-child process relationships
- Machine Learning for Detecting Phishing Websites
- Password Hunting with ML in Active Directory
- Как самому разработать систему обнаружения компьютерных атак на основе машинного обучения (RUS)
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Machine Learning for Red Teams, Part 1
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Building Machine Learning Models for the SOC
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Using Machine Learning to Classify Packet Captures
- Deep Session Learning for Cyber Security
- Obfuscated Command Line Detection Using Machine Learning
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
- Using Machine Learning to Classify Packet Captures
-
[↑](#table-of-contents) Talks
- Secure Because Math: A Deep-Dive on ML-Based Monitoring
- Machine Duping 101: Pwning Deep Learning Systems
- Using Machine Learning to Support Information Security
- Defending Networks with Incomplete Information
- Applying Machine Learning to Network Security Monitoring
- Measuring the IQ of your Threat Intelligence Feeds
- Data-Driven Threat Intelligence: Metrics On Indicator Dissemination And Sharing
- Machine Learning for Threat Detection
- Delta Zero, KingPhish3r – Weaponizing Data Science for Social Engineering
- Defeating Machine Learning What Your Security Vendor Is Not Telling You
- Applied Machine Learning for Data Exfil and Other Fun Topics
- CrowdSource: Crowd Trained Machine Learning Model for Malware Capability Det
- Defeating Machine Learning: Systemic Deficiencies for Detecting Malware
- Packet Capture Village – Theodora Titonis – How Machine Learning Finds Malware
- Build an Antivirus in 5 Min – Fresh Machine Learning #7. A fun video to watch
- Hunting for Malware with Machine Learning
- Machine Learning and the Cloud: Disrupting Threat Detection and Prevention
- Fraud detection using machine learning & deep learning
- The Applications Of Deep Learning On Traffic Identification
- Defending Networks With Incomplete Information: A Machine Learning Approach
- Machine Learning & Data Science
- Advances in Cloud-Scale Machine Learning for Cyber-Defense
- Applied Machine Learning: Defeating Modern Malicious Documents
- Automated Prevention of Ransomware with Machine Learning and GPOs
- Learning to Detect Malware by Mining the Security Literature
- Clarence Chio and Anto Joseph - Practical Machine Learning in Infosecurity
- Advances in Cloud-Scale Machine Learning for Cyberdefense
- Machine Learning-Based Techniques For Network Intrusion Detection
- Practical Machine Learning in Infosec
- AI and Security
- AI in InfoSec
- Beyond the Blacklists: Detecting Malicious URL Through Machine Learning
- Machine Learning Fueled Cyber Threat Hunting
- Weaponizing Machine Learning: Humanity Was Overrated
- Machine Learning, Offense, and the future of Automation
- Bringing Red vs. Blue to Machine Learning
- Explaining Machine Learning with Azure and the Titanic Dataset
- Using Machines to exploit Machines
- Analyze active directory event logs using visualize and ML
- Hardening Machine Learning Defenses Against Adversarial Attacks
- Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools
- ML in the daily work of a threat hunter
- The Real Deal About AI: ML for CyberSecurity - Josh Fu
- Automated Detection of Software Vulnerabilities Using Deep-Learning
- Building and Breaking a Machine Learning System - Johann Rehberger
- Vulnerabilities of Machine Learning Infrastructure - Sergey Gordeychik
-
[↑](#table-of-contents) Datasets
- HIKARI-2021 Datasets
- Stratosphere IPS Data Sets
- Open Data Sets
- Data Capture from National Security Agency
- KDD Cup 1999 Data
- Aktaion Data Sets
- CRIME Database from DeepEnd Research
- 2007 TREC Public Spam Corpus
- Drebin Android Malware Dataset
- PhishingCorpus Datset
- EMBER
- Vizsec Research
- SHERLOCK
- Aegean Wireless Intrusion Dataset (AWID)
- NSL-KDD Data Sets
- Samples of Security Related Data
- DARPA Intrusion Detection Data Sets - d/datasets/1998-darpa-intrusion-detection-evaluation-dataset) / [1999](https://www.ll.mit.edu/r-d/datasets/1999-darpa-intrusion-detection-evaluation-dataset) ]
-
[↑](#table-of-contents) Courses
-
[↑](#table-of-contents) Miscellaneous