The report of a supervised classifier to detect malware in TLS traffic
☆20Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for tls-malware-detection
Users that are interested in tls-malware-detection are comparing it to the libraries listed below
Sorting:
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Aug 14, 2020Updated 5 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 9 years ago
- 2018年国际AIOps挑战赛KPI时序异常检测比赛基于OpenMLDB部署的工程化部署实践方案☆12Aug 30, 2022Updated 3 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- Python tools for targeted pcap analysis.☆13Sep 9, 2015Updated 10 years ago
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17May 5, 2021Updated 4 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Mar 4, 2023Updated 3 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.☆27Nov 23, 2022Updated 3 years ago
- This repository contains tools used by 401trg.☆20Apr 14, 2021Updated 4 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Nov 8, 2020Updated 5 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆29Sep 23, 2025Updated 5 months ago
- ☆24Mar 11, 2022Updated 3 years ago
- ☆28May 6, 2021Updated 4 years ago
- PCAP files and data sets to Digital Investigation article☆28Nov 2, 2019Updated 6 years ago
- Trending Research Topics In Cybersecurity☆20Jul 16, 2020Updated 5 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆38Oct 2, 2020Updated 5 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- Codes for MICCAI 2021 Paper: Selective Learning from External Data for CT Image Segmentation☆12Oct 10, 2021Updated 4 years ago
- ☆34Oct 10, 2018Updated 7 years ago
- ☆40Dec 10, 2021Updated 4 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Submission for MICCAI HACKATHON: https://miccai-hackathon.com/#participate☆15Jul 19, 2023Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- An effective share hashmap based on dpdk☆13May 30, 2016Updated 9 years ago