☆26Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for NetML-Competition2020
Users that are interested in NetML-Competition2020 are comparing it to the libraries listed below
Sorting:
- ☆16Mar 16, 2021Updated 5 years ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆101Jun 25, 2022Updated 3 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- ☆14Feb 26, 2025Updated last year
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆30Aug 2, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- Encrypted Traffic Classification at Line Rate in Programmable Switches with Machine Learning☆19Feb 2, 2026Updated last month
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆32Dec 20, 2024Updated last year
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- Wang Wei's End-to-end encrypted traffic classification with one-dimensional convolution neural networks (scripts and article))☆36Sep 21, 2020Updated 5 years ago
- Encrypted traffic classification use CNN☆35Dec 7, 2020Updated 5 years ago
- ☆16May 9, 2022Updated 3 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆41May 4, 2024Updated last year
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- 本项目旨在设计和实现一个基于深度学习的加密恶意流量检测系统。通过将网络流量数据转换为图像数据,并利用图像分类模型进行检测,该系统能够有效地检测加密恶意流量。在数据集选取上使用了包含加密恶意和正常流量的数据集,以更好地反映实际网络环境中的特征和行为模式。在数据预处理方面,通过…☆14Feb 28, 2024Updated 2 years ago
- 本科毕业设计-加密恶意流量检测☆24Jun 11, 2024Updated last year
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Feb 5, 2024Updated 2 years ago
- ☆58Dec 8, 2022Updated 3 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Jun 22, 2023Updated 2 years ago
- official implementation of RoSAS: Deep Semi-supervised Anomaly Detection with Contamination-resilient Continuous Supervision☆11Jul 18, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- ☆30Apr 11, 2022Updated 3 years ago
- Code for "SUGAR: Subgraph Neural Network with Reinforcement Pooling and Self-Supervised Mutual Information Mechanism""☆10Apr 17, 2021Updated 4 years ago
- In-network detection of network attacks using Random Forests and P4☆28Dec 22, 2023Updated 2 years ago
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17May 5, 2021Updated 4 years ago
- ☆24Aug 8, 2025Updated 7 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- 收集了人工智能在网络安全领域的比赛、应用案例和博客。☆22Feb 21, 2020Updated 6 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- ☆12Jul 22, 2020Updated 5 years ago
- Prediction-Based Dual-Weight Switch Migration Scheme for SDN Load Balancing☆10Nov 23, 2021Updated 4 years ago
- Code Repository for Paper "HRGCN: Heterogeneous Graph-level Anomaly Detection with Hierarchical Relation-augmented Graph Neural Networks"☆15Sep 24, 2023Updated 2 years ago
- Parallel Quantum Annealing☆10Jan 7, 2023Updated 3 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Dec 4, 2025Updated 3 months ago
- 使用LSTM预测回归问题,使用注意力机制自动提取特征的重要程度。Using LSTM to predict regression problems, Attention mechanism is used to automatically extract the impor…☆18Aug 30, 2020Updated 5 years ago