vinayakumarr / DMD2018Links
Detection of malicious domain names using machine learning and deep learning models
☆16Updated 6 years ago
Alternatives and similar repositories for DMD2018
Users that are interested in DMD2018 are comparing it to the libraries listed below
Sorting:
- This is a paper list about Machine Learning for IDSes☆89Updated last year
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆173Updated 2 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆126Updated 7 years ago
- A collection of resources for security data☆41Updated 7 years ago
- PDF Malware Parser☆20Updated 9 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆37Updated last year
- ☆79Updated 5 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆107Updated last year
- ☆25Updated 4 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 7 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 5 years ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆94Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated 2 years ago
- SSH traffic analysis☆23Updated 6 years ago
- ☆13Updated last year
- This program allow you to extract some features from pcap files.☆40Updated 2 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆60Updated 4 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- Pytorch implementation of MalConv☆71Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆34Updated last year
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 4 years ago
- Repository of Bachelor's Major Project on Botnet Detection☆163Updated 7 years ago
- A library for adversarial classifier evasion☆43Updated 10 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 3 weeks ago
- Machine Learning Models to Detect and Classify Malicious URLs☆53Updated 2 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Updated 6 years ago