viral98 / seq2seq-anomaly-detection
A Natural Language Processing based approach to detect malicious HTTP requests.
☆11Updated 4 years ago
Alternatives and similar repositories for seq2seq-anomaly-detection:
Users that are interested in seq2seq-anomaly-detection are comparing it to the libraries listed below
- 第三届阿里云安全算法挑战赛☆37Updated last year
- Anomaly detection based on DNS traffic analysis☆51Updated 4 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆71Updated 6 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- ☆11Updated 5 months ago
- ☆14Updated 6 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆19Updated 5 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆155Updated 2 years ago
- dns tunnel dectect with CNN☆62Updated 5 years ago
- 恶意代码家族聚类。DataCon☆11Updated 5 years ago
- 阿里云安全恶意程序检测比赛☆113Updated 4 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆112Updated 6 years ago
- Applying text model to Detection Task☆72Updated 7 years ago
- security machine learning☆72Updated 7 years ago
- tcp pcap to weka☆20Updated 7 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆42Updated 5 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 10 months ago
- ☆12Updated 5 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆67Updated 4 years ago
- 第二届阿里云安全算法挑战赛☆16Updated 6 years ago
- ☆62Updated 7 years ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Updated 3 years ago
- Classification LSTM RNN for DeepLog realization☆8Updated 6 years ago
- a demo for detecting anomaly url☆39Updated 7 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆70Updated last year
- My AI security testing projects☆41Updated 6 years ago