tarcisio-marinho / A-Deep-Learning-Approach-to-Web-Application-FirewallLinks
Avoid malicious payloads in your webapp with machine learning!
☆19Updated 2 years ago
Alternatives and similar repositories for A-Deep-Learning-Approach-to-Web-Application-Firewall
Users that are interested in A-Deep-Learning-Approach-to-Web-Application-Firewall are comparing it to the libraries listed below
Sorting:
- Simple machine learning based web application firewall (WAF) created in python☆57Updated last year
- ☆75Updated 7 years ago
- Machine Learning WAF Based☆94Updated 4 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆30Updated 11 months ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆188Updated last year
- Cybersecurity of Machine Learning and Artificial Intelligence☆73Updated 3 years ago
- ☆26Updated 4 years ago
- Dataset contains several benign and attacks samples which can be used as values in HTTP protocol.☆47Updated 4 years ago
- Machine Learning for Cyber Security☆29Updated 3 years ago
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆68Updated 4 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆49Updated 2 years ago
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆11Updated 6 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- This is an open source Snort rules repository☆30Updated 3 years ago
- IoT and Operational Technology Honeypot☆104Updated last year
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 8 months ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated 2 months ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆14Updated 2 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆132Updated this week
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- A Machine Learning Model to classify samples as XSS (Cross Site-Scrtpting)☆31Updated 2 years ago
- A machine learning based Intrusion Detection System☆137Updated 5 years ago
- This repository contain some datas about CVE's updated hourly, to help community Prioritize, based in sources the Threat Intelligence in …☆25Updated this week