ybubnov / deep-lookupLinks
Deep Learning for Domain Name System
☆19Updated 3 years ago
Alternatives and similar repositories for deep-lookup
Users that are interested in deep-lookup are comparing it to the libraries listed below
Sorting:
- DGA Detection with ML and DL☆48Updated 5 years ago
- Domain Generation Algorithm official repository. Please visit the WIKI page for more information☆11Updated last year
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆29Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆80Updated 10 months ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆65Updated 2 years ago
- The repository that contains the algorithms for generating domain names, dictionaries of malicious domain names. Developed to research th…☆219Updated 7 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆70Updated last month
- DGA-generated domain detection using deep learning models☆23Updated 2 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆56Updated 4 years ago
- DGA Domains detection☆66Updated 7 years ago
- IDS based on Machine Learning technical☆20Updated 6 years ago
- Suricata Extreme Performance Tuning guide - Mark II☆117Updated 7 years ago
- Cyber Threat Intelligence Feeds☆96Updated 8 years ago
- Suspicious DGA from PDNS and Sandbox.☆185Updated 2 years ago
- Apache Metron☆59Updated 4 years ago
- Suricata Extreme Performance Tuning guide☆209Updated 7 years ago
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- DNS tunneling over DoH Dataset☆11Updated 2 years ago
- Suricata rules for network anomaly detection☆164Updated last month
- ☆269Updated 6 years ago
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆13Updated 5 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based I…☆22Updated 6 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆65Updated 5 years ago
- A Zeek log writer plugin that publishes to Kafka.☆48Updated 5 months ago
- zeek-scripts☆43Updated 6 years ago
- Extract Features from suspected DNS Tunneling traffic☆12Updated 8 years ago