ahlashkari / DoHLyzerView external linksLinks
DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.
☆72May 15, 2023Updated 2 years ago
Alternatives and similar repositories for DoHLyzer
Users that are interested in DoHLyzer are comparing it to the libraries listed below
Sorting:
- Domain Generation Algorithm official repository. Please visit the WIKI page for more information☆12Jul 22, 2023Updated 2 years ago
- 支持自定义和扩展的流量捕捉工具☆17Feb 8, 2026Updated last week
- flowRecorder - a network traffic flow feature measurement tool☆21Jan 14, 2019Updated 7 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- In this work different types of network traffic such as: email, chat, browsing etc were classified using time related features. The main …☆12Mar 14, 2020Updated 5 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 2 years ago
- Hexo Blog☆10Feb 7, 2025Updated last year
- tcp pcap to weka☆20Mar 5, 2017Updated 8 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15May 17, 2022Updated 3 years ago
- A collection of resources for security data☆41Nov 23, 2017Updated 8 years ago
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆22Jul 9, 2020Updated 5 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 10 months ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 9 years ago
- Detect kerberos attacks in pcap files☆29Dec 13, 2015Updated 10 years ago
- Code for “FS-Net: A Flow Sequence Network For Encrypted Traffic Classification”☆117Jul 9, 2020Updated 5 years ago
- ☆24Mar 11, 2022Updated 3 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆33Dec 6, 2024Updated last year
- A Behavior-Based Device Identification Method for the IoT☆58Feb 25, 2025Updated 11 months ago
- ☆26Jul 6, 2023Updated 2 years ago
- Toolkit for processing PCAP file and transform into image of MNIST dataset☆256Jan 4, 2024Updated 2 years ago
- DGA Domains detection☆70Apr 10, 2018Updated 7 years ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated last year
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- Implementation of a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN.☆39Dec 24, 2023Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆30May 30, 2024Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- ☆40Dec 10, 2021Updated 4 years ago
- Deep Learning models for network traffic classification☆758Jan 30, 2026Updated 2 weeks ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago