AddrMiner / smap
☆15Updated last month
Alternatives and similar repositories for smap
Users that are interested in smap are comparing it to the libraries listed below
Sorting:
- ☆11Updated last year
- ☆21Updated 11 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆9Updated 9 months ago
- The repository of 6GAN, an IPv6 multi-pattern target generation algorithm using Generative Adversarial Nets with reinforcement learning. …☆20Updated 3 years ago
- IPv6 Internet Wide Scanning☆18Updated last month
- ☆11Updated 5 years ago
- High-speed, Load-Distributive Middlebox Detector☆10Updated last year
- Using Android Malware Dataset (CICAndMal2017)☆10Updated 5 years ago
- A tunneled flooding traffic detection system.☆19Updated 5 months ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆18Updated 4 years ago
- Metis: Understanding and Enhancing Regular Expressions in Network☆13Updated 2 years ago
- ☆13Updated 2 years ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆12Updated 5 years ago
- 6Graph is an efficient IPv6 address generator☆24Updated 3 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆9Updated 3 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆10Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- 布谷鸟异构图构建,对比学习☆11Updated 2 years ago
- cnvd_spider 国家信息安全漏洞共享平台的部分数据爬虫☆8Updated 6 years ago
- ☆10Updated 3 years ago
- 🔐 A list of anonymity papers published from 2012 to 2024.☆13Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆16Updated 3 years ago
- 用python复现 《Target Generation for Internet-wide IPv6 Scanning 》的6Gen算法☆13Updated 6 years ago
- agurim: a multi-dimensional flow aggregation tool☆21Updated 5 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Updated 4 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆15Updated 3 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆11Updated last year