Anomaly detection based on DNS traffic analysis
☆55Jul 30, 2020Updated 5 years ago
Alternatives and similar repositories for BotDAD
Users that are interested in BotDAD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆30Sep 23, 2022Updated 3 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- 第三届阿里云安全算法挑战赛☆37Jul 6, 2023Updated 2 years ago
- 基于深度学习对dga恶意域名检测研究☆58Dec 8, 2022Updated 3 years ago
- My AI security testing projects☆41Jan 16, 2019Updated 7 years ago
- using iodine to tunnel IP via DNS☆14Feb 4, 2020Updated 6 years ago
- ☆50Apr 24, 2024Updated last year
- ☆21Dec 22, 2020Updated 5 years ago
- Things about the graduates☆12Apr 25, 2022Updated 3 years ago
- dns tunnel dectect with CNN☆63Jan 2, 2020Updated 6 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- Anomaly Detection in Network Traffic using different clustering algorithm.☆18Jun 8, 2017Updated 8 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- A system which has a real-time & light-weight anomaly detection algorithm based on streaming data from UAV sensors in to order to get the…☆14Jan 3, 2020Updated 6 years ago
- Online multiclass boosting algorithm that uses VFDT as weak learners☆17Oct 24, 2018Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- Metasploit Framework☆25Jan 12, 2020Updated 6 years ago
- dga classification with fasttext☆12Oct 29, 2018Updated 7 years ago
- A comprehensive collection of Data Science and Artificial Intelligence projects, including hands-on examples, course materials, and solut…☆21Jul 24, 2025Updated 7 months ago
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆47Jun 13, 2022Updated 3 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- ☆16Mar 16, 2021Updated 5 years ago
- Flexible, high performance IMDB & disk hybrid database written in Go. Features a brand-new modernistic query language and deep schema va…☆13Apr 21, 2024Updated last year
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- Easy-to-Hard Learning for Information Extraction (ACL 2023 Findings)☆14Jul 11, 2023Updated 2 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- Phishing URL Detection with Deep Learning☆14Feb 28, 2024Updated 2 years ago
- Open directory indexer☆10Jan 8, 2023Updated 3 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Feb 5, 2024Updated 2 years ago
- A program for downloading sci literature☆10May 10, 2018Updated 7 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- 基于Bilstm + CRF的信息抽取模型☆37Aug 2, 2021Updated 4 years ago
- ☆15Mar 8, 2017Updated 9 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆71May 15, 2023Updated 2 years ago
- Tensorflow version of the AdaMod Optimizer☆11May 12, 2020Updated 5 years ago
- Alpine Docker Container for proxy services with IP Tables☆10Aug 31, 2019Updated 6 years ago