viral98 / seq2seq-anomaly-detection
A Natural Language Processing based approach to detect malicious HTTP requests.
☆11Updated 4 years ago
Alternatives and similar repositories for seq2seq-anomaly-detection:
Users that are interested in seq2seq-anomaly-detection are comparing it to the libraries listed below
- 第三届阿里云安全算法挑战赛☆37Updated last year
- Anomaly detection based on DNS traffic analysis☆52Updated 4 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- Malicious domain name detection based on tensorflow☆34Updated 7 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Updated 5 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated last year
- My AI security testing projects☆41Updated 6 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- dns tunnel dectect with CNN☆63Updated 5 years ago
- security machine learning☆72Updated 7 years ago
- ☆62Updated 7 years ago
- 第三届阿里云安全算法挑战赛冠军代码☆112Updated 6 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72Updated 6 years ago
- 恶意代码家族聚类。DataCon☆11Updated 5 years ago
- Machine-learning-based intrusion detection☆36Updated 6 years ago
- 恶意软件家族样本识别/分类器☆12Updated 3 years ago
- ☆14Updated 6 years ago
- malware classify 第三届『阿里云安全算法挑战赛』源码☆16Updated 6 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆42Updated 5 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- Applying text model to Detection Task☆73Updated 7 years ago
- https://www.cdxy.me/?p=806☆31Updated 5 years ago
- This is a paper list about Machine Learning for IDSes☆88Updated 7 months ago
- Trending Research Topics In Cybersecurity☆20Updated 4 years ago
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Updated 3 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆19Updated 5 years ago
- Automatic Malware Signature Generation Tool☆16Updated 3 years ago
- 阿里云安全恶意程序检测比赛☆113Updated 4 years ago