Name: kahsay kalayu
Type: User
Company: INSA(information network security agency)
Bio: This is Kahsay Kalayu, A Senior Numerical Algorithm Designer, With 9+years working experience in Software Development and Design.
Location: Addis Ababa, Ethiopia
Blog: https://github.com/kahsay
kahsay kalayu's Projects
15 minute (small) desktop apps built with PyQt
Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs (Accepted by Automated Software Engineering 2023)
Machine learning algorithms to detect anomalies in unstructured logs
Using Unsupervised methods to identify anomalies in user behaviour through IP Profiling
Analysis scripts for log data sets used in anomaly detection.
Anomaly Detection in logs data using Unsupervised Machine Learning Algorithms
Berkeley algorithm implementation, using Client-Server Architecture (Java RMI), for Distributed Systems class at FURB.
Berkeley Algorithm implemented in Java
Course Project for CS751 [Principles of Concurrent and Parallel Programming]
Centralized server provides chat room services to clients using Corba RMI and IDL
Simple CORBA Example for Distributed Systems course
Application CORBA avec JNDI
This is a primitive CORBA echo server (and client) implementation in multiple languages, intended for educational purposes.
it's a simple project in which I showed how CORBA works and how to communicate between the server side and the client.
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Utilizing various Open Source Intelligence (OSINT) tools and techniques that we have found to be effective, DataSploit brings them all into one place, correlates the raw data captured and gives the user, all the relevant information about the domain/email/ phone number/person, etc. It allows you to collect relevant information about a target which can expand your attack/defence surface very quickly. Sometimes it might even pluck the low hanging fruits for you without even touching the target and give you quick wins. More documentation here: http://datasploit.readthedocs.io/en/latest/.
A deep learning toolkit for log-based anomaly detection
PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning
Pytorch Implementation of DeepLog.
Home of the dionaea honeypot
Learn to create a desktop app with Python and Qt
Detect anomalies in network traffic data using Federated Machine Learning technique.
flowRecorder - a network traffic flow feature measurement tool
a network packet capture compiler
CORBA server/client for SceneViewer.
An Instagram Open Source Intelligence Tool
Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.
Config files for my GitHub profile.
The Open edX LMS & Studio, powering education sites around the world!