asharma353 / Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites
The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Therefore, it is usually the primary target for most of the malicious attacks such as DNS Poisoning and Rogue DNS servers. With the help of 0x20 bit encoding, the problem of DNS Poisoning is mitigated to quite a larg…
☆15Updated 4 years ago
Alternatives and similar repositories for Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites:
Users that are interested in Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites are comparing it to the libraries listed below
- Ender of Fast-Flux malicious domains.☆26Updated 10 years ago
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- Network timing evaluation used to detect beacons, works with argus flow as the source☆19Updated 8 years ago
- Detection of malicious domains via character co-occurrence analysis in URL's.☆9Updated 8 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆53Updated 7 years ago
- security machine learning☆72Updated 7 years ago
- passive dns collector☆10Updated 7 years ago
- My AI security testing projects☆41Updated 6 years ago
- dns tunnel dectect with CNN☆62Updated 5 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Updated 10 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆218Updated 7 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆66Updated 4 years ago
- ☆16Updated 5 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 5 years ago
- Snort rules☆35Updated 6 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆42Updated 5 years ago
- A collection of known Domain Generation Algorithms☆66Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Python library to get the Alexa rank of the domain of any URL☆10Updated 12 years ago
- Malicious domain name detection based on tensorflow☆34Updated 7 years ago
- tcp stream dump with BPF filter rules | bidirection | domain☆48Updated 5 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆32Updated 4 years ago
- ☆73Updated 6 years ago
- ☆38Updated last year