asharma353 / Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites
The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Therefore, it is usually the primary target for most of the malicious attacks such as DNS Poisoning and Rogue DNS servers. With the help of 0x20 bit encoding, the problem of DNS Poisoning is mitigated to quite a larg…
☆16Updated 4 years ago
Alternatives and similar repositories for Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites:
Users that are interested in Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites are comparing it to the libraries listed below
- Anomaly detection based on DNS traffic analysis☆52Updated 4 years ago
- Ender of Fast-Flux malicious domains.☆26Updated 10 years ago
- Detection of malicious domains via character co-occurrence analysis in URL's.☆10Updated 9 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- security machine learning☆72Updated 7 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- Malicious domain name detection based on tensorflow☆35Updated 7 years ago
- dns tunnel dectect with CNN☆64Updated 5 years ago
- Uses deep learning and machine learning techniques to detect and classify web pages as spam, malware and phishing☆62Updated 4 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- An anomaly-based intrusion detection system.☆82Updated 2 years ago
- My AI security testing projects☆41Updated 6 years ago
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- Industrial control Security Tool☆77Updated 4 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆219Updated 7 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆67Updated 4 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- tcp stream dump with BPF filter rules | bidirection | domain☆48Updated 5 years ago
- An Intrusion Detection System written in Python☆26Updated last year
- Snort rules☆35Updated 6 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆128Updated 3 years ago
- Machine Learning WAF Based☆94Updated 4 years ago
- awesome security paper☆155Updated 9 years ago
- passive dns collector☆10Updated 8 years ago
- Sample DGA classifier☆124Updated 9 years ago
- DGA Detection with ML and DL☆47Updated 5 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆26Updated 8 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago