此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu
☆16Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for CCF-BDCI2022-Web-Attack-Detection-and-Classification
Users that are interested in CCF-BDCI2022-Web-Attack-Detection-and-Classification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Attacks Detection based on CNN☆17Apr 6, 2019Updated 6 years ago
- My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP request…☆26Mar 5, 2024Updated 2 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Zero day attack detection AI model based on seq2seq autoencoder☆11May 31, 2022Updated 3 years ago
- Avoid malicious payloads in your webapp with machine learning!☆21Feb 6, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- 基于半监督深度学习的木马流量检测方法☆29Jun 11, 2023Updated 2 years ago
- ☆18Dec 1, 2024Updated last year
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- 脱敏的毕业设计——网络安全课程实验仿真系统☆13May 19, 2021Updated 4 years ago
- ☆11May 14, 2024Updated last year
- ☆21Jan 6, 2025Updated last year
- ☆14Feb 12, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated 3 months ago
- Export the articles and reports from Google Scholar easily! (The spider structure is inspired by the Scrapy framework)☆12Nov 10, 2023Updated 2 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆14May 12, 2025Updated 10 months ago
- Convert mermaid flowchart to Graphviz/Dot syntax☆21May 19, 2015Updated 10 years ago
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated last year
- ☆17Mar 22, 2026Updated last week
- 基于Django的网络安全事件应急响应与处置系统☆13Feb 11, 2025Updated last year
- 华为认证考试题库☆10Aug 29, 2018Updated 7 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- angular5+ant design+ng-alain校园网入侵检测系统☆11Jun 2, 2022Updated 3 years ago
- The official dataset of the flowvqa project.☆21Mar 26, 2024Updated 2 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- 内网安全从零开始红队教程,这可能是国内最系统最适合小白的内网安全教程。☆45Sep 25, 2023Updated 2 years ago
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Cross-site-scripting attacks: A Comprehensive dataset for AI techniques usage☆21Apr 15, 2022Updated 3 years ago
- 整理的一些hw前期准备工作 以及针对攻击者的溯源思路 水平较菜,如有错误或者遗漏的地方还请各位指正 参考资料较多 动态 IP 移动基站 代理池IP(谷歌、百度 是否有处于代理池C段) 国外扫描傀儡机(被标记时间普遍较久、扫描目标众多) 动态域名服务商(如花生壳、公云等) …☆21Apr 3, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ICML2025 | From Feature Interaction to Feature Generation: A Generative Paradigm of CTR Prediction Models☆35Sep 17, 2025Updated 6 months ago
- 黑客画像构建以及威胁事件的预测,通过搜集各大黑客技术论坛的聊天记录,绘制任务的拓扑图,以及技能雷达图。同时进一步预测监控攻击事件的发生以及溯源☆21Mar 1, 2019Updated 7 years ago
- A paper list of vulnerability detection using deep learning (updating)☆14Apr 26, 2024Updated last year
- Webhawk/Catch helps automatically finding web attack traces in logs☆16Aug 12, 2025Updated 7 months ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆39Jul 25, 2021Updated 4 years ago
- A Machine Learning Based Web Application firewall☆10Nov 23, 2023Updated 2 years ago
- Convert PHP code into PHP opcode, use GaussianNB for training☆10Mar 21, 2020Updated 6 years ago