chrmor / DGA_domains_datasetLinks
Collected dataset of DGA domains and Alexa domains. Used for experiments in automatic DGA domains classification.
☆19Updated 3 years ago
Alternatives and similar repositories for DGA_domains_dataset
Users that are interested in DGA_domains_dataset are comparing it to the libraries listed below
Sorting:
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆31Updated 2 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Updated last year
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆83Updated last week
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆96Updated last year
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆67Updated 2 years ago
- Machine Learning Models to Detect and Classify Malicious URLs☆53Updated 2 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆70Updated 6 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆21Updated 4 years ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Updated 5 years ago
- ☆16Updated 4 years ago
- ☆116Updated 5 years ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆29Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆37Updated last year
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆26Updated last year
- Public datasets to help you address various cyber security problems.☆444Updated 3 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- DDoS attack analysis using Machine Learning☆44Updated 4 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆110Updated 2 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆219Updated 8 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆93Updated 2 years ago
- DGA Detection with ML and DL☆51Updated 5 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- CTI database generator and public dataset☆21Updated 5 years ago
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆166Updated 4 years ago
- Network traffic classifier based on machine learning algorithms☆44Updated 3 years ago