DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.
☆72May 15, 2023Updated 2 years ago
Alternatives and similar repositories for DoHLyzer
Users that are interested in DoHLyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Domain Generation Algorithm official repository. Please visit the WIKI page for more information☆11Jul 22, 2023Updated 2 years ago
- flowRecorder - a network traffic flow feature measurement tool☆21Jan 14, 2019Updated 7 years ago
- DNS tunneling over DoH Dataset☆11Mar 9, 2023Updated 3 years ago
- ☆22Feb 14, 2020Updated 6 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- 支持自定义和扩展的流量捕捉工具☆17Feb 8, 2026Updated 2 months ago
- tcp pcap to weka☆20Mar 5, 2017Updated 9 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- A quick mass domain crawler that I use to crawl zone files.☆17Aug 29, 2015Updated 10 years ago
- A CoreDNS plugin that performs DNS-over-HTTPS proxying☆36Aug 23, 2022Updated 3 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- A replicated implementation of the article 'DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning' in Tensorflow 2.3.☆12Jan 2, 2021Updated 5 years ago
- The RKN caused problems all over Russian Internet. This is list of services which suffered from RKN blockings activity.☆18Dec 24, 2018Updated 7 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 10 years ago
- SSL/TLS layers for scapy the interactive packet manipulation tool☆10Feb 7, 2017Updated 9 years ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- Anomaly detection based on DNS traffic analysis☆55Jul 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A collection of resources for security data☆42Nov 23, 2017Updated 8 years ago
- Implementation of a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN.☆42Dec 24, 2023Updated 2 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 7 years ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- 通过pcap文件生成描述网络传输报文的文本文件☆16Dec 22, 2017Updated 8 years ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Toolkit for processing PCAP file and transform into image of MNIST dataset☆261Jan 4, 2024Updated 2 years ago
- Tutorial about machine learning and deep learning framework.☆26Jan 3, 2022Updated 4 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Feb 5, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 收集了部分将机器学习应用于网络流量分类的论文☆174Jul 5, 2020Updated 5 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆129Jul 20, 2018Updated 7 years ago
- A list of domains that popular VPNs use. Due to the nature of VPNs, it's best not to rely on DNS to block, but use to SquidGuard (or othe…☆10Jun 4, 2020Updated 5 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- Code for “FS-Net: A Flow Sequence Network For Encrypted Traffic Classification”☆121Jul 9, 2020Updated 5 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- ☆14Jul 26, 2024Updated last year