Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffic flows. It involves various classifiers including Neural Networks, Decision Tree, SVM, Naive Bayes, Logistic Regression, k-Nearest Neighbours.
☆68Oct 15, 2020Updated 5 years ago
Alternatives and similar repositories for Machine-Learning-Based-Botnet-Detection
Users that are interested in Machine-Learning-Based-Botnet-Detection are comparing it to the libraries listed below
Sorting:
- Repository of Bachelor's Major Project on Botnet Detection☆177Jun 13, 2018Updated 7 years ago
- Topological botnet detection datasets and graph neural network applications☆180Dec 8, 2022Updated 3 years ago
- Classifying network traffic using machine learning approach☆24Jul 5, 2020Updated 5 years ago
- A LSTM based framework for handling multiclass imbalance in DGA botnet detection☆22Sep 10, 2020Updated 5 years ago
- App for tracking college bunks.☆54Apr 17, 2017Updated 8 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- Botnet detection on IoT Devices☆30Mar 7, 2021Updated 5 years ago
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆41Sep 4, 2016Updated 9 years ago
- The use of machine learning to classify network traffic☆40Aug 28, 2020Updated 5 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- Network traffic classifier based on machine learning algorithms☆48Jul 16, 2022Updated 3 years ago
- Machine Learning on dataset HTTP CSIC 2010☆35May 25, 2018Updated 7 years ago
- 中科大13级计算机病毒分析与WindowsAPI编程 授课老师:郭大侠☆37Jul 2, 2015Updated 10 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- Detecting DGA bots in a single network using DNS traffic☆26Feb 7, 2018Updated 8 years ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- PoC Android smart phone botnet☆79Aug 4, 2012Updated 13 years ago
- Web版webshell☆12Jan 27, 2018Updated 8 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- Network Traffic Identification with Convolutional Neural Networks☆27Jan 23, 2019Updated 7 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- A tutorial on how to build an artificial neural network model based on URL data.☆17Aug 23, 2018Updated 7 years ago
- Identification and prioritization of multimedia traffic in wireless access points☆26Jun 30, 2016Updated 9 years ago
- SDN project 2019 on Mininet☆13Aug 3, 2023Updated 2 years ago
- A lightweight web application firewall module for nginx, which is already used in the production environment.☆14Mar 20, 2014Updated 12 years ago
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31May 22, 2017Updated 8 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- ☆13Feb 15, 2020Updated 6 years ago
- Website for draco, the OverTheWire warzone☆12Sep 7, 2015Updated 10 years ago
- [ICML 2023] "Data Efficient Neural Scaling Law via Model Reusing" by Peihao Wang, Rameswar Panda, Zhangyang Wang☆14Jan 4, 2024Updated 2 years ago
- Reconnecting Websocket Client Golang Library☆11May 13, 2017Updated 8 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- Toolkit for processing PCAP file and transform into image of MNIST dataset☆258Jan 4, 2024Updated 2 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Dec 6, 2017Updated 8 years ago