asharma353 / Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites
The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Therefore, it is usually the primary target for most of the malicious attacks such as DNS Poisoning and Rogue DNS servers. With the help of 0x20 bit encoding, the problem of DNS Poisoning is mitigated to quite a larg…
☆14Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites
- Ender of Fast-Flux malicious domains.☆26Updated 10 years ago
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- security machine learning☆71Updated 7 years ago
- Detection of malicious domains via character co-occurrence analysis in URL's.☆9Updated 8 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆27Updated last year
- Network timing evaluation used to detect beacons, works with argus flow as the source☆19Updated 8 years ago
- Malicious domain name detection based on tensorflow☆34Updated 6 years ago
- dns tunnel dectect with CNN☆62Updated 4 years ago
- Evading Snort Intrusion Detection System.☆75Updated 3 years ago
- Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop…☆15Updated 7 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆16Updated 3 years ago
- The python client of 360 Netlab whois database☆14Updated 5 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆42Updated 5 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Updated 9 years ago
- passive dns collector☆10Updated 7 years ago
- Python library to get the Alexa rank of the domain of any URL☆10Updated 11 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 6 years ago
- 根据Golismero源码二次开发的分布式漏洞扫描器(调试版)☆19Updated 8 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 5 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆31Updated 6 months ago
- My AI security testing projects☆41Updated 5 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 4 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Updated 12 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆27Updated 7 years ago
- An anomaly-based intrusion detection system.☆80Updated last year
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆66Updated 4 years ago
- 非法域名挖掘与画像系统。☆37Updated 7 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆53Updated 7 years ago