chwress / salad
A Content Anomaly Detector based on n-Grams
☆23Updated 8 years ago
Alternatives and similar repositories for salad:
Users that are interested in salad are comparing it to the libraries listed below
- A Tool for Embedding Strings in Vector Spaces☆58Updated 5 years ago
- A Tool for Measuring String Similarity☆116Updated 5 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- Realtime and Online Model Development Framework☆27Updated 7 years ago
- A project that implements statistical methods for identifying anomalous files☆22Updated 10 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- POC IDS anomaly detection engine built with iPython notebook, matplotlib, pandas, numpy, scikit-learn, d3.js, hyperloglog implementation,…☆79Updated 10 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- ☆12Updated 7 years ago
- Ipython notebook that illustrates effectiveness of machine learning algorithms in anomaly detection of netflow data (inbound/outbound DDo…☆78Updated 7 years ago
- An Exploration into Graph Databases☆28Updated 9 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated last year
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- A Simple Network Stream Recorder☆35Updated 6 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 7 years ago
- Small python library to create semantic graphs in JSON.☆95Updated 9 years ago
- Tools for scraping of twitter data, conversion, text analysis and graph construction☆11Updated 8 years ago
- encoding format, library, and utilities for passive DNS data☆26Updated 11 months ago
- ☆11Updated 7 years ago
- Python library to get the Alexa rank of the domain of any URL☆10Updated 12 years ago
- Code for generating analyses found in "Analyzing Log Analysis: An Empirical Study of User Log Mining" to appear in LISA 2014.☆8Updated 10 years ago
- ☆43Updated 9 years ago
- Threatmonitor - Packet Analysis suite☆11Updated 8 years ago
- Passivedns monitor implementation in Rust.☆12Updated 8 years ago
- A program that uses xapian to index the flat file databases used by nfdump or flow-tools☆36Updated 7 years ago
- pythonic access to fastbit☆26Updated 6 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Aperture-Tiles uses familiar web-based map interactions to allow exploration of arbitrary huge data sets.☆74Updated last year
- Ender of Fast-Flux malicious domains.☆26Updated 10 years ago