☆26Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for NetML-Competition2020
Users that are interested in NetML-Competition2020 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- ☆15Feb 26, 2025Updated last year
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆12Sep 4, 2019Updated 6 years ago
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆31Aug 2, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- Encrypted Traffic Classification at Line Rate in Programmable Switches with Machine Learning☆20Feb 2, 2026Updated 2 months ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆32Dec 20, 2024Updated last year
- Wang Wei's End-to-end encrypted traffic classification with one-dimensional convolution neural networks (scripts and article))☆36Sep 21, 2020Updated 5 years ago
- Enrich IP addresses with metadata and threat intelligence indicators.☆24Aug 12, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆41May 4, 2024Updated last year
- ☆16May 9, 2022Updated 3 years ago
- 本项目旨在设计和实现一个基于深度学习的加密恶意流量检测系统。通过将网络流量数据转换为图像数据,并利用图像分类模型进行检测,该系统能够有效地检测加密恶意流量。在数据集选取上使用了包含加密恶意和正常流量的数据集,以更好地反映实际网络环境中的特征和行为模式。在数据预处理方面,通过…☆14Feb 28, 2024Updated 2 years ago
- 本科毕业设计-加密恶意流量检测☆24Jun 11, 2024Updated last year
- ☆58Dec 8, 2022Updated 3 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Dec 5, 2020Updated 5 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆66Jun 22, 2023Updated 2 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆49Aug 10, 2020Updated 5 years ago
- Code for "SUGAR: Subgraph Neural Network with Reinforcement Pooling and Self-Supervised Mutual Information Mechanism""☆10Apr 17, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- In-network detection of network attacks using Random Forests and P4☆28Dec 22, 2023Updated 2 years ago
- ☆12Jun 19, 2024Updated last year
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17May 5, 2021Updated 4 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆33Apr 8, 2022Updated 4 years ago
- ☆24Aug 8, 2025Updated 8 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Bro Live! A Bro training/learning environment.☆14Jul 21, 2015Updated 10 years ago
- Examples of different Siamese Neural Networks architectures applied to well-known datasets.☆13Sep 1, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Parallel Quantum Annealing☆10Jan 7, 2023Updated 3 years ago
- MIT 6.857 Group Project☆10May 30, 2019Updated 6 years ago
- This repository contains the code used and developed during a master thesis at DTU Compute in 2018☆43Jun 23, 2018Updated 7 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Dec 4, 2025Updated 4 months ago
- 使用LSTM预测回归问题,使用注意力机制自动提取特征的重要程度。Using LSTM to predict regression problems, Attention mechanism is used to automatically extract the impor…☆18Aug 30, 2020Updated 5 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Mar 27, 2026Updated last month
- Code for Graph-level Anomaly Detection via Hierarchical Memory Networks (HimNet)☆18Oct 6, 2023Updated 2 years ago