Are you sure you want to delete this task? Once this task is deleted, it cannot be recovered.
caoyunfei 18c8c279fa | 1 year ago | |
---|---|---|
app | 1 year ago | |
webapp | 1 year ago | |
.gitignore | 1 year ago | |
Dockerfile | 1 year ago | |
LICENSE | 1 year ago | |
README.md | 1 year ago | |
application.yml | 1 year ago | |
build-docker.sh | 1 year ago | |
pack_model.py | 1 year ago | |
pip-install-reqs.sh | 1 year ago | |
requirements.txt | 1 year ago | |
run_model_server.py | 1 year ago |
现在网络安全的最大威胁来自于勒索,常见的做法是让受控主机和C&C(Command and Control,简称C2)主机进行通信并接受控制,勒索的触发都需要涉及如何和C2通信。
C2自然会是那种过街老鼠,东躲西藏,通常的做法是按照某种特定的算法生成一个DNS域名,通过查询获得地址。
本模型预测域名是否为恶意域名。本模型参考: https://mp.weixin.qq.com/s/F7ouaxtZmCAUhUpp0pUR_A
本模型基于 ServiceBoot微服务引擎 开发,参见: 《CubeAI模型开发指南》 。
本模型可发布至 CubeAI智立方平台 进行共享和部署,参见: 《CubeAI模型发布指南》 。
本模型还可直接基于git源代码在本机进行部署和运行,参见: 《CubeAI模型独立部署指南》 或 CubeAI Docker Builder 。
更多CubeAI模型样例请参见: 《CubeAI模型示范库》 。
本模型提供了1个API接口:
API接口1:
API端点: /api/data
HTTP方法: POST
HTTP请求体:
{
"action": "predict"
"args": {
"domain_name": <待检测的域名>
}
}
HTTP响应体:
{
"status": "ok"|"err",
"value": <域名为恶意的概率>
}
现在网络安全的最大威胁来自于勒索,常见的做法是让受控主机和C&C(Command and Control,简称C2)主机进行通信并接受控制,勒索的触发都需要涉及如何和C2通信。C2自然会是那种过街老鼠,东躲西藏,通常的做法是按照某种特定的算法生成一个DNS域名,通过查询获得地址,例如wannacry所采用的域名。 本模型参考 《支持AI的ZaDNS服务器》https://mp.weixin.qq.com/s/F7ouaxtZmCAUhUpp0pUR_A
TypeScript Python HTML Dockerfile Shell other
Dear OpenI User
Thank you for your continuous support to the Openl Qizhi Community AI Collaboration Platform. In order to protect your usage rights and ensure network security, we updated the Openl Qizhi Community AI Collaboration Platform Usage Agreement in January 2024. The updated agreement specifies that users are prohibited from using intranet penetration tools. After you click "Agree and continue", you can continue to use our services. Thank you for your cooperation and understanding.
For more agreement content, please refer to the《Openl Qizhi Community AI Collaboration Platform Usage Agreement》