viral98 / seq2seq-anomaly-detectionLinks
A Natural Language Processing based approach to detect malicious HTTP requests.
☆11Updated 4 years ago
Alternatives and similar repositories for seq2seq-anomaly-detection
Users that are interested in seq2seq-anomaly-detection are comparing it to the libraries listed below
Sorting:
- 第三届阿里云安全算法挑战赛☆37Updated last year
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- dns tunnel dectect with CNN☆63Updated 5 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆112Updated 6 years ago
- Anomaly detection based on DNS traffic analysis☆53Updated 4 years ago
- ☆14Updated 7 years ago
- Repo for CS 259D: Data Mining for Cyber Security☆18Updated 10 years ago
- Malicious domain name detection based on tensorflow☆35Updated 7 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆157Updated 3 years ago
- ☆16Updated 7 years ago
- ☆62Updated 7 years ago
- security machine learning☆72Updated 8 years ago
- 阿里云安全恶意程序检测比赛☆114Updated 4 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72Updated 7 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43Updated 6 years ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Updated 3 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- My AI security testing projects☆41Updated 6 years ago
- 使用LSTM模型检测DGA域名☆42Updated 5 years ago
- 恶意软件家族样本识别/分类器☆12Updated 3 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆68Updated 4 years ago
- ☆13Updated 5 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆129Updated 4 years ago
- Applying text model to Detection Task☆73Updated 8 years ago
- ☆13Updated 2 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- 第二届阿里云安全算法挑战赛☆16Updated 7 years ago
- Insider Threat Detection using Isolation Forest☆16Updated 7 years ago