PositiveTechnologies / seq2seq-web-attack-detection
The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The main goal of this project is to demonstrate the relevance of the NLP approach for web security.
☆155Updated 2 years ago
Alternatives and similar repositories for seq2seq-web-attack-detection:
Users that are interested in seq2seq-web-attack-detection are comparing it to the libraries listed below
- ☆73Updated 6 years ago
- This is a paper list about Machine Learning for IDSes☆88Updated 4 months ago
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- DGA Detection with ML and DL☆46Updated 5 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆154Updated 4 years ago
- An IDS implementation using machine learning☆36Updated 7 years ago
- Machine Learning WAF Based☆92Updated 4 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆267Updated 2 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆125Updated 3 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆71Updated 6 years ago
- NSL-KDD Dataset☆175Updated 9 years ago
- Applying text model to Detection Task☆72Updated 7 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Updated 4 years ago
- User and Entity Behavior Analytics by deep learning☆103Updated 3 years ago
- Machine-learning-based intrusion detection☆33Updated 6 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆40Updated 4 years ago
- dns tunnel dectect with CNN☆62Updated 5 years ago
- A Dataset for the task of Malicious URL Detection☆20Updated 7 years ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆28Updated 2 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆69Updated 11 months ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆154Updated last year
- Machine Learning on dataset HTTP CSIC 2010☆30Updated 6 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 5 years ago
- 第三届阿里云安全算法挑战赛☆37Updated last year
- The project is to detect malware traffic in TLS flows using ML☆35Updated 4 years ago
- Malicious domain name detection based on tensorflow☆34Updated 7 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Updated 3 years ago
- ☆52Updated 6 years ago