Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.
-
Updated
Jul 17, 2020 - Jupyter Notebook
Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.
Deep Learning Tool for Off-line Network Intrusion Detection System
A commercial grade threat intelligence feed thats validated and updated every half hour.
SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.
LogAnalyz3r is a Java application for log analysis and visualization, specifically tailored for logs generated by Apache, Nginx, and ModSecurity.
All of IP's comes from my public honeypot.
DiaLog is a powerful Log File Analyzer that can also do passive analysis of malicious IP's Found in web-server Traffic
Relieving the manual task of checking the ip reputation
Use the Prowl API to obtain IP Reputation, Techniques Tactics and Procedures, Indicators of Attacks and Indicators of Compromise related to a public IP.
My personal research on different attack vectors, including DDoS attack types, payloads and a honeypot sensor to detect malicious actors.
Add a description, image, and links to the malicious-traffic topic page so that developers can more easily learn about it.
To associate your repository with the malicious-traffic topic, visit your repo's landing page and select "manage topics."