Korving-F / doh-tunnel-datasetLinks
DNS tunneling over DoH Dataset
☆11Updated 2 years ago
Alternatives and similar repositories for doh-tunnel-dataset
Users that are interested in doh-tunnel-dataset are comparing it to the libraries listed below
Sorting:
- ☆14Updated 4 years ago
- 通过pcap文件生成描述网络传输报文的文本文件☆16Updated 7 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆188Updated 2 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆67Updated 2 years ago
- 从pcap获取流的基本信息工具☆223Updated 2 years ago
- 基于深度学习对dga恶意域名检测研究☆54Updated 2 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆98Updated last week
- Toolkit for processing PCAP file and transform into image of MNIST dataset☆245Updated last year
- 网络流量领域工具库、公开数据集及加密流量解析方法☆83Updated 2 years ago
- ☆26Updated 7 years ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- ☆269Updated 7 years ago
- DGA Detection with ML and DL☆51Updated 6 years ago
- Flow Interaction Graph based attack traffic detection system.☆171Updated last year
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆29Updated 3 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆75Updated 4 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆645Updated last year
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆131Updated last year
- Material from the DARPA Transparent Computing Program☆207Updated 5 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Updated 6 years ago
- Traffic dataset USTC-TFC2016☆146Updated 6 years ago
- ☆23Updated 4 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 5 years ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,240Updated 2 years ago
- nPrintML creates and runs full ML-based traffic analysis pipelines using nPrint and AutoML.☆55Updated last year
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆357Updated last year
- 多进程读取pcap,基于五元组分流并提取流量特征。结果输出为csv文件,用于机器学习中对加密流量进行分类☆92Updated 3 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆21Updated 4 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆214Updated last year