syssec-utd/provninja

Evading Provenance-Based ML Detectors with Adversarial System Actions

40
/ 100
Emerging

This project helps cybersecurity researchers understand how to bypass machine learning models designed to detect intrusions. It takes provenance data – detailed logs of system activities – and generates "gadget chains" or adversarial examples. The output helps security researchers and red team professionals identify vulnerabilities in existing intrusion detection systems.

No commits in the last 6 months.

Use this if you are a cybersecurity researcher or red team professional looking to evaluate the robustness of provenance-based intrusion detection systems against adversarial attacks.

Not ideal if you are looking for an out-of-the-box intrusion detection solution or a general-purpose security tool for production environments.

cybersecurity-research intrusion-detection adversarial-machine-learning red-teaming system-provenance
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 7 / 25
Maturity 16 / 25
Community 17 / 25

How are scores calculated?

Stars

35

Forks

11

Language

Python

License

BSD-3-Clause

Last pushed

Aug 18, 2024

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/syssec-utd/provninja"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.