Billy1900/Awesome-AI-for-cybersecurity
Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavior (anti-fraud).
This resource provides a curated list of research papers and methods showcasing how AI, particularly machine learning, is applied across various cybersecurity domains. It helps security practitioners understand how AI can be used for tasks like intrusion detection, malware analysis, application security, user behavior analytics, and fraud detection. You'll find examples of what AI techniques (like classification or anomaly detection) can achieve for different security challenges.
239 stars. No commits in the last 6 months.
Use this if you are a cybersecurity professional looking for concrete examples and research to understand how machine learning can enhance your organization's security posture across network, endpoint, application, user, and process layers.
Not ideal if you are looking for ready-to-use software tools or code to implement AI solutions directly, as this is a list of concepts and research, not an implementation guide.
Stars
239
Forks
35
Language
—
License
—
Category
Last pushed
Oct 03, 2023
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/Billy1900/Awesome-AI-for-cybersecurity"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
TalEliyahu/Awesome-AI-Security
Curated resources, research, and tools for securing AI systems
The-Art-of-Hacking/h4cker
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources...
aw-junaid/Hacking-Tools
This Repository is a collection of different ethical hacking tools and malware's for penetration...
jiep/offensive-ai-compilation
A curated list of useful resources that cover Offensive AI.
Kim-Hammar/csle
A research platform to develop automated security policies using quantitative methods, e.g.,...