balahmadi-Ox / BOTection
Bot Detection by Building Markov Chain Models of Bots Network Behavior
☆15Updated 4 years ago
Alternatives and similar repositories for BOTection:
Users that are interested in BOTection are comparing it to the libraries listed below
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆42Updated last year
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆20Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆69Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆52Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆20Updated 2 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆12Updated last year
- ☆75Updated last year
- ☆21Updated 3 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆15Updated 5 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- The Tangled Genealogy of IoT Malware☆12Updated 4 years ago
- ☆22Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆31Updated 2 years ago
- ☆15Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆134Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Updated 7 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆63Updated 2 years ago
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆79Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆30Updated 2 years ago
- ☆13Updated 5 years ago
- 布谷鸟异构图构建,对比学习☆11Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆43Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆38Updated this week
- ☆12Updated 5 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 6 years ago