Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.
-
Updated
Jul 17, 2020 - Jupyter Notebook
Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.
Deep Learning Tool for Off-line Network Intrusion Detection System
SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.
A commercial grade threat intelligence feed thats validated and updated every half hour.
All of IP's comes from my public honeypot.
DiaLog is a powerful Log File Analyzer that can also do passive analysis of malicious IP's Found in web-server Traffic
Use the Prowl API to obtain IP Reputation, Techniques Tactics and Procedures, Indicators of Attacks and Indicators of Compromise related to a public IP.
My personal research on different attack vectors, including DDoS attack types, payloads and a honeypot sensor to detect malicious actors.
Add a description, image, and links to the malicious-traffic topic page so that developers can more easily learn about it.
To associate your repository with the malicious-traffic topic, visit your repo's landing page and select "manage topics."