sosdow / RLHPot
An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks
☆21Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for RLHPot
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆10Updated 5 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆49Updated 7 years ago
- An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning☆27Updated 5 years ago
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆73Updated 6 years ago
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- A logic-based enterprise network security analyzer☆110Updated last year
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Updated last year
- An IDS implementation using machine learning☆36Updated 7 years ago
- An SDN based security system for Botnet based DDoS attacks.☆13Updated 9 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- ☆73Updated 6 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆31Updated 6 months ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT☆41Updated 5 years ago
- Machine-learning-based intrusion detection☆32Updated 6 years ago
- The project is to detect malware traffic in TLS flows using ML☆32Updated 4 years ago
- Coburg Intrusion Detection Data Sets☆49Updated 7 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- Machine Learning WAF Based☆92Updated 4 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆11Updated 3 years ago
- ☆14Updated 7 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆27Updated last year
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆103Updated 2 years ago
- A collection of resources for security data☆40Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆74Updated 3 months ago
- A SDN project to implement moving target defense☆10Updated 10 years ago
- ICS Cybersecurity PCAP respository☆49Updated 5 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆58Updated last year
- Suricata rules for the new critical vulnerabilities☆80Updated 3 years ago