此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu
☆15Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for CCF-BDCI2022-Web-Attack-Detection-and-Classification
Users that are interested in CCF-BDCI2022-Web-Attack-Detection-and-Classification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP request…☆26Mar 5, 2024Updated 2 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Zero day attack detection AI model based on seq2seq autoencoder☆12May 31, 2022Updated 3 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- Avoid malicious payloads in your webapp with machine learning!☆21Feb 6, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆23Oct 22, 2024Updated last year
- ☆18Dec 1, 2024Updated last year
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- 脱敏的毕业设计——网络安全课程实验仿真系统☆13May 19, 2021Updated 4 years ago
- ☆11May 14, 2024Updated last year
- ☆21Jan 6, 2025Updated last year
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 6 years ago
- ☆14Jul 29, 2024Updated last year
- ☆14Feb 12, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆17Apr 4, 2026Updated 2 weeks ago
- Export the articles and reports from Google Scholar easily! (The spider structure is inspired by the Scrapy framework)☆12Nov 10, 2023Updated 2 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆14May 12, 2025Updated 11 months ago
- Convert mermaid flowchart to Graphviz/Dot syntax☆21May 19, 2015Updated 10 years ago
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated last year
- ☆18Apr 8, 2026Updated last week
- 基于Django的网络安全事件应急响应与处置系统☆13Feb 11, 2025Updated last year
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- angular5+ant design+ng-alain校园网入侵检测系统☆11Jun 2, 2022Updated 3 years ago
- Pytorch implementation of Adaptive Information Transfer Multi-task (AITM)☆19Mar 17, 2022Updated 4 years ago
- 内网安全从零开始红队教程,这可能是国内最系统最适合小白的内网安全教程。☆45Sep 25, 2023Updated 2 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- 多粒度时序知识图谱问答Baseline模型☆23May 28, 2023Updated 2 years ago
- A historical security and software archaeology archive for Greasyfork.org☆39Apr 4, 2026Updated 2 weeks ago
- 整理的一些hw前期准备工作 以及针对攻击者的溯源思路 水平较菜,如有错误或者遗漏的地方还请各位指正 参考资料较多 动态 IP 移动基站 代理池IP(谷歌、百度 是否有处于代理池C段) 国外扫描傀儡机(被标记时间普遍较久、扫描目标众多) 动态域名服务商(如花生壳、公云等) …☆20Apr 3, 2021Updated 5 years ago
- RNA secondary structure prediction tool☆20Apr 7, 2026Updated last week
- 一个基于区块链的存储系统,可以在多个节点(设备)中,为用户生成非对称加密的公私钥对,并使用此密钥对,对数据进行加密上传,和解密下载。☆14Nov 16, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Mar 1, 2019Updated 7 years ago
- 基于HoshinoBot与AI_image_gen插件,进行快捷的TAG查询与使用。☆15Oct 20, 2022Updated 3 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测 恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆39Jul 25, 2021Updated 4 years ago
- 官方openwrt极路由X补丁☆10Jul 29, 2022Updated 3 years ago
- 基于机器学习的web攻击检测系统☆92May 8, 2024Updated last year
- 基于深度学习的webshell检测☆15May 8, 2021Updated 4 years ago
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago