WalterDiong / TLS-Malware-Detection-with-Machine-LearningLinks
Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption
☆39Updated 5 years ago
Alternatives and similar repositories for TLS-Malware-Detection-with-Machine-Learning
Users that are interested in TLS-Malware-Detection-with-Machine-Learning are comparing it to the libraries listed below
Sorting:
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Updated 6 years ago
- ☆14Updated 6 years ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Updated 3 years ago
- ☆27Updated 6 years ago
- 阿里云安全恶意程序检测比赛☆116Updated 4 years ago
- ☆172Updated 7 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43Updated 6 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆121Updated 3 weeks ago
- This is a paper list about Machine Learning for IDSes☆90Updated last year
- User and Entity Behavior Analytics by deep learning☆118Updated 4 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆109Updated 4 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Updated last year
- Material from the DARPA Transparent Computing Program☆221Updated 5 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆42Updated 5 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆166Updated 2 years ago
- 🔫基于scapy的SSL/TLS特征提取工具及相应随机森林分类器模型☆20Updated 5 years ago
- Flow Interaction Graph based attack traffic detection system.☆184Updated last year
- ☆102Updated 5 years ago
- Training Vision Transformers from Scratch for Malware Classification☆30Updated 4 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Updated 3 years ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆118Updated 5 years ago
- Traffic analysis for Tor-based malware detection and classification☆42Updated 2 years ago
- li-zhenyuan / Effective-and-Light-Weight-Deobfuscation-and-Semantic-Aware-Attack-Detection-for-PowerShell-Scripts☆22Updated 5 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆218Updated last year
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆67Updated 6 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Updated 2 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆356Updated 3 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆30Updated 7 years ago