Git Product home page Git Product logo

Along's Projects

anomaly-detection-by-netflow-and-dns-analysis-of-alexa-1m-websites icon anomaly-detection-by-netflow-and-dns-analysis-of-alexa-1m-websites

The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Therefore, it is usually the primary target for most of the malicious attacks such as DNS Poisoning and Rogue DNS servers. With the help of 0x20 bit encoding, the problem of DNS Poisoning is mitigated to quite a large extent. Although, it has a minor requirement that the authoritative nameserver should be able to preserve the case of the DNS query. It is usually difficult to detect the rogue DNS server above the stub resolver. We propose an anomaly detection system which would be able to raise a red flag in case of DNS Poisoning and malicious DNS authority by passive DNS analysis of domain names and then comparing them with the 0th day cluster of the database. We perform the passive DNS analysis for 27 days by querying the whois server of CYMRU, compare the network profiles of the domain names crawled with the 0th day cluster and categorize the domain names as static, benign anomaly and malicious anomaly depending upon the cluster a domain name shifted. In the process, we also create a WHOIS repository for Alexa domain names which is faster to query than the WHOIS server.

anomalydetector icon anomalydetector

this folder contains the possible anomaly detector(s) that can be used with the Ripe DNS measurements

dns icon dns

Detection and suppression of Water Torture DDoS in DNS with Machine Learning Method.

dns-elk icon dns-elk

Experimental DNS logs pipeline based on Pi-hole dnsmasq logs, ELK stack, and Filebeat. Sample configs included.

dnscap icon dnscap

Network capture utility designed specifically for DNS traffic

dnshunter icon dnshunter

DNShunter is a python based module that is written for MercenaryHuntFramework & Mercenary-Linux. Currently it reads in .pcap files and extracts the DNS Queries and Answers. In addition to extracting the queries & answers, it also performs a geo-lookup of the domains & the associated IP's. This makes it easy to catch attacks such as DNS Cache Poisoning and DNSBeacons. EX: [Q] firstnationalbank.com -> resolving to Indonesia

dnspop icon dnspop

Analysis of DNS records to find popular trends

dnsspoof icon dnsspoof

DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response

elk-tcpdump icon elk-tcpdump

Code to aggregate tcpdump traffic and send to ELK (Elasticsearch-Logstach-Kibana)

examples icon examples

Home for Elasticsearch examples available to everyone. It's a great way to get started.

flask-shotwell icon flask-shotwell

Flask-Restless based web front end to the Shotwell photo manager.

flaskberry icon flaskberry

A simple web application to manage your Raspberry Pi.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.