DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.
☆72May 15, 2023Updated 2 years ago
Alternatives and similar repositories for DoHLyzer
Users that are interested in DoHLyzer are comparing it to the libraries listed below
Sorting:
- flowRecorder - a network traffic flow feature measurement tool☆21Jan 14, 2019Updated 7 years ago
- 支持自定义和扩展的流量捕捉工具☆17Feb 8, 2026Updated last month
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- In this work different types of network traffic such as: email, chat, browsing etc were classified using time related features. The main …☆12Mar 14, 2020Updated 5 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆675Dec 4, 2023Updated 2 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- tcp pcap to weka☆20Mar 5, 2017Updated 9 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆22Jul 9, 2020Updated 5 years ago
- A collection of resources for security data☆42Nov 23, 2017Updated 8 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 10 months ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 9 years ago
- Code for “FS-Net: A Flow Sequence Network For Encrypted Traffic Classification”☆118Jul 9, 2020Updated 5 years ago
- ☆24Mar 11, 2022Updated 3 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆33Dec 6, 2024Updated last year
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Dec 30, 2019Updated 6 years ago
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆164Sep 2, 2025Updated 6 months ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- Implementation of a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN.☆39Dec 24, 2023Updated 2 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Tutorial about machine learning and deep learning framework.☆26Jan 3, 2022Updated 4 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆130Jul 20, 2018Updated 7 years ago