vs-uulm / 2017-SUEE-data-set
☆8Updated 5 years ago
Alternatives and similar repositories for 2017-SUEE-data-set:
Users that are interested in 2017-SUEE-data-set are comparing it to the libraries listed below
- ICS Cybersecurity PCAP respository☆51Updated 5 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- ☆21Updated 3 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆39Updated 5 months ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆73Updated 7 years ago
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆55Updated 4 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 5 months ago
- The report of a supervised classifier to detect malware in TLS traffic☆19Updated 5 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆145Updated last year
- A logic-based enterprise network security analyzer☆112Updated last year
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated 3 months ago
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆12Updated 4 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆75Updated 5 months ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆63Updated last year
- ☆25Updated last year
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆11Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 5 years ago
- A collection of resources for security data☆40Updated 7 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Updated 3 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆103Updated 2 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 4 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆54Updated 4 years ago
- Defense from the 2020 Microsoft Evasion Competition☆16Updated 3 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆60Updated 5 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆60Updated last year
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆165Updated last year
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆49Updated 2 years ago