tarcisio-marinho / A-Deep-Learning-Approach-to-Web-Application-FirewallLinks
Avoid malicious payloads in your webapp with machine learning!
☆19Updated 2 years ago
Alternatives and similar repositories for A-Deep-Learning-Approach-to-Web-Application-Firewall
Users that are interested in A-Deep-Learning-Approach-to-Web-Application-Firewall are comparing it to the libraries listed below
Sorting:
- Simple machine learning based web application firewall (WAF) created in python☆58Updated last year
- Machine Learning WAF Based☆95Updated 4 years ago
- ☆76Updated 7 years ago
- A Machine Learning Based Web Application firewall☆11Updated last year
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- packet captures of real-world ddos attacks☆163Updated last week
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆191Updated last year
- ☆26Updated 4 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆39Updated 5 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆23Updated 6 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆368Updated 2 years ago
- WAFBench (wb) is a tool to measure the performance of WAF(Web Application Firewall) . It's based on latest code of ab (ApacheBench), and …☆112Updated 2 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆34Updated last year
- Open Source Security Information and event Management☆95Updated 9 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Repository of Bachelor's Major Project on Botnet Detection☆162Updated 7 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆18Updated 5 years ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆47Updated last year
- An anomaly-based intrusion detection system.☆83Updated 2 years ago
- Anomaly detection based on DNS traffic analysis☆53Updated 4 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- IoT and Operational Technology Honeypot☆103Updated last year
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- Machine-learning-based intrusion detection☆38Updated 7 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆87Updated 2 years ago
- A machine learning approach to detect phishing urls☆28Updated 3 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆68Updated 4 years ago
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆69Updated this week
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆136Updated this week