netrack / learn
Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection
☆28Updated 2 years ago
Alternatives and similar repositories for learn:
Users that are interested in learn are comparing it to the libraries listed below
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Updated 8 years ago
- DGA Detection with ML and DL☆47Updated 5 years ago
- An IDS implementation using machine learning☆36Updated 7 years ago
- ☆268Updated 6 years ago
- Suspicious DGA from PDNS and Sandbox.☆183Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- 通过pcap文件生成描述网络传输报文的文本文件☆15Updated 7 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆218Updated 7 years ago
- DGA Domains detection☆63Updated 6 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆75Updated 7 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆70Updated last year
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆15Updated 3 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆81Updated 4 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆64Updated last year
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆27Updated 5 years ago
- IDS Alert Prioritization INSuRE Research Project☆17Updated 5 years ago
- dns tunnel dectect with CNN☆62Updated 5 years ago
- Suricata rules for the new critical vulnerabilities☆81Updated 4 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- A LSTM based framework for handling multiclass imbalance in DGA botnet detection☆22Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 6 months ago
- 基于深度学习对dga恶意域名检测研究☆53Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆55Updated 4 years ago
- ☆52Updated 6 years ago
- ☆101Updated 4 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆31Updated 7 years ago