asharma353 / Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websitesLinks
The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Therefore, it is usually the primary target for most of the malicious attacks such as DNS Poisoning and Rogue DNS servers. With the help of 0x20 bit encoding, the problem of DNS Poisoning is mitigated to quite a larg…
☆16Updated 4 years ago
Alternatives and similar repositories for Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites
Users that are interested in Anomaly-Detection-by-Netflow-and-DNS-Analysis-of-Alexa-1M-websites are comparing it to the libraries listed below
Sorting:
- Detection of malicious domains via character co-occurrence analysis in URL's.☆10Updated 9 years ago
- Ender of Fast-Flux malicious domains.☆27Updated 10 years ago
- Anomaly detection based on DNS traffic analysis☆53Updated 4 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- security machine learning☆72Updated 8 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 9 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Updated last year
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- dns tunnel dectect with CNN☆63Updated 5 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆129Updated 4 years ago
- ☆16Updated 6 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆68Updated 4 years ago
- Malicious domain name detection based on tensorflow☆35Updated 7 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- Operating system remote fingerprinting attack and detection tools☆54Updated 11 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Updated 7 years ago
- IDS based on Machine Learning technical☆20Updated 6 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Uses deep learning and machine learning techniques to detect and classify web pages as spam, malware and phishing☆62Updated 4 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆219Updated 7 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- My AI security testing projects☆41Updated 6 years ago
- A machine learning approach to detect phishing urls☆28Updated 2 years ago
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- ☆76Updated 7 years ago
- 使用机器学习识别WebShell☆127Updated 7 years ago
- A Dataset for the task of Malicious URL Detection☆21Updated 7 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 4 years ago