PositiveTechnologies / seq2seq-web-attack-detection
The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The main goal of this project is to demonstrate the relevance of the NLP approach for web security.
☆155Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for seq2seq-web-attack-detection
- ☆73Updated 6 years ago
- Machine Learning WAF Based☆92Updated 4 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆38Updated 4 years ago
- This is a paper list about Machine Learning for IDSes☆86Updated 2 months ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆126Updated 3 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆69Updated 9 months ago
- An IDS implementation using machine learning☆36Updated 7 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆153Updated 3 years ago
- DGA Detection with ML and DL☆47Updated 5 years ago
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- Machine-learning-based intrusion detection☆31Updated 6 years ago
- A Dataset for the task of Malicious URL Detection☆20Updated 6 years ago
- ☆62Updated 7 years ago
- NSL-KDD Dataset☆172Updated 9 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Updated 4 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- Machine Learning and Security | Using machine learning to detect malicious URLs☆265Updated 2 years ago
- dns tunnel dectect with CNN☆61Updated 4 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆66Updated 4 years ago
- Applying text model to Detection Task☆71Updated 7 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆71Updated 6 years ago
- User and Entity Behavior Analytics by deep learning☆99Updated 3 years ago
- A series of labs that will help users apply various data science techniques to security related data.☆130Updated 9 years ago
- ☆53Updated 6 years ago
- Collection of cyber security and "AI" relevant topics☆75Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- ☆271Updated 6 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆81Updated 4 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆134Updated 5 years ago