tarcisio-marinho / A-Deep-Learning-Approach-to-Web-Application-Firewall
Avoid malicious payloads in your webapp with machine learning!
☆19Updated 2 years ago
Alternatives and similar repositories for A-Deep-Learning-Approach-to-Web-Application-Firewall:
Users that are interested in A-Deep-Learning-Approach-to-Web-Application-Firewall are comparing it to the libraries listed below
- Simple machine learning based web application firewall (WAF) created in python☆57Updated last year
- Machine Learning WAF Based☆94Updated 4 years ago
- ☆74Updated 7 years ago
- A machine learning approach to detect phishing urls☆28Updated 2 years ago
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆30Updated 9 months ago
- Web Applicaiton Firewall Implementation using Deep Learning☆13Updated 2 years ago
- First iteration of ML based Feedback WAF☆58Updated last year
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆135Updated last year
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆72Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Payloads that can be used for testing web application firewalls☆45Updated 2 years ago
- Suricata rules for the new critical vulnerabilities☆81Updated 4 years ago
- ☆26Updated 4 years ago
- This is an open source Snort rules repository☆30Updated 2 years ago
- Web Attacks Detection based on CNN☆16Updated 6 years ago
- This project implements a cybersecurity system for detecting anomalies and intrusions in network traffic. It utilizes machine learning mo…☆16Updated last year
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆20Updated 4 years ago
- ☆55Updated 6 years ago
- A Dataset for the task of Malicious URL Detection☆21Updated 7 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆46Updated 4 years ago
- Hands-On Artificial Intelligence for Cybersecurity, publised by Packt☆147Updated 2 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 6 months ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Updated last year
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆131Updated this week
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 4 years ago
- An Interface for AI built for cybersecurity professionals☆91Updated 2 months ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago