alexamanpreet / Network-Log-and-Traffic-AnalysisLinks
Identify malicious behavior and attacks using Machine Learning with Python
☆48Updated 8 years ago
Alternatives and similar repositories for Network-Log-and-Traffic-Analysis
Users that are interested in Network-Log-and-Traffic-Analysis are comparing it to the libraries listed below
Sorting:
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆156Updated this week
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆368Updated 2 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆52Updated 2 years ago
- Repository of Bachelor's Major Project on Botnet Detection☆162Updated 7 years ago
- ☆76Updated 7 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆141Updated 6 years ago
- Chrome extension for detecting phishing web sites☆249Updated 4 years ago
- Hands-On Machine Learning for Cybersecurity, published by Packt☆195Updated 2 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆437Updated last year
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆172Updated 2 years ago
- A machine learning based Intrusion Detection System☆142Updated 5 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆106Updated 5 years ago
- A Dataset for the task of Malicious URL Detection☆21Updated 7 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆207Updated last year
- User and Entity Behavior Analytics by deep learning☆112Updated 4 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆158Updated 2 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆130Updated 4 years ago
- Malicious Web Sites Detection using Suspicious URL☆74Updated 4 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 8 years ago
- A collection of resources for security data☆41Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 11 months ago
- Collection of cyber security and "AI" relevant topics☆74Updated 7 years ago
- ☆55Updated 6 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆157Updated 3 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 7 years ago
- Detecting malicious URLs using an autoencoder neural network☆41Updated 2 years ago