The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The main goal of this project is to demonstrate the relevance of the NLP approach for web security.
☆156Mar 21, 2022Updated 3 years ago
Alternatives and similar repositories for seq2seq-web-attack-detection
Users that are interested in seq2seq-web-attack-detection are comparing it to the libraries listed below
Sorting:
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Oct 2, 2020Updated 5 years ago
- Web Attacks Detection based on CNN☆17Apr 6, 2019Updated 6 years ago
- Zero day attack detection AI model based on seq2seq autoencoder☆11May 31, 2022Updated 3 years ago
- High Frequency Time series Anomaly Detection using Self Organizing Maps (SOM) which is based on Competitive Learning a variant of the Neu…☆11Jul 16, 2018Updated 7 years ago
- Проект для перевода чисел, записанных в текстовом виде на русском языке.☆11Apr 5, 2022Updated 3 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- Monoidal stack machine☆10Nov 25, 2018Updated 7 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- A "gym" style toolkit for building lightweight NAS systems.☆13Jun 13, 2022Updated 3 years ago
- ☆77Feb 26, 2018Updated 8 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- dga classification with fasttext☆13Oct 29, 2018Updated 7 years ago
- ☆11Jun 19, 2024Updated last year
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆54Sep 4, 2020Updated 5 years ago
- Machine Learning for Cyber Security☆8,151Aug 19, 2024Updated last year
- User Behavior Analysis using OSSEC on cloud infrastructures☆10Feb 27, 2017Updated 9 years ago
- An attempt to detect fraud in online transaction in deep neural network using pytorch☆13Apr 19, 2018Updated 7 years ago
- Deep learnning for detection with xss☆147Apr 24, 2025Updated 10 months ago
- Machine Learning on dataset HTTP CSIC 2010☆35May 25, 2018Updated 7 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Source code about machine learning and security.☆2,077Sep 2, 2022Updated 3 years ago
- Plugin packages that provide custom visualizations and analytics capabilities to Trisul Network Analytics.☆17Jan 27, 2026Updated last month
- ☆13Aug 15, 2017Updated 8 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago
- A collection of example for learning how to use Golang.☆14May 4, 2019Updated 6 years ago
- ☆16Mar 5, 2018Updated 8 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- Dirtyc0w Docker POC☆14Nov 7, 2016Updated 9 years ago
- Artificial intelligence-driven Web Firewall☆177Apr 6, 2017Updated 8 years ago
- library for filling in missing values using artificial intelligence methods☆18Jan 8, 2023Updated 3 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Oct 28, 2022Updated 3 years ago
- Customized Jupyter Spark Docker images with everything you need☆16May 3, 2025Updated 10 months ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago