dreizehnutters/pcapAE

convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.

34
/ 100
Emerging

This project helps network security analysts detect unusual activity in industrial control systems by examining raw network traffic. It takes network packet capture (PCAP) files as input and outputs potential anomalies, along with explanations of why certain network segments are flagged. This tool is designed for network defenders or security operations center (SOC) personnel monitoring critical infrastructure.

No commits in the last 6 months.

Use this if you need to identify hidden, spatial-temporal anomalies in network traffic from industrial control systems without relying on known attack signatures.

Not ideal if you need a quick, off-the-shelf solution for general IT network intrusion detection, as this is more specialized for industrial contexts.

network-security industrial-control-systems anomaly-detection cyber-physical-systems threat-hunting
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 6 / 25
Maturity 16 / 25
Community 12 / 25

How are scores calculated?

Stars

18

Forks

3

Language

Jupyter Notebook

License

MIT

Last pushed

Feb 16, 2024

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/dreizehnutters/pcapAE"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.