Unknown protocol identification theory research and clustering experiment
☆17Nov 27, 2019Updated 6 years ago
Alternatives and similar repositories for Unknown-Protocol-Identification
Users that are interested in Unknown-Protocol-Identification are comparing it to the libraries listed below
Sorting:
- High performance deep packet inspection AI model using neural networks with an embedding layer, 1D Convolution layers and bidirectional g…☆25Aug 19, 2022Updated 3 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- Network Traffic Identification with Convolutional Neural Networks☆27Jan 23, 2019Updated 7 years ago
- A flow-based network monitor with Deep Packet Inspection☆29Oct 27, 2016Updated 9 years ago
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- Implementation of "How to Achieve High Classification Accuracy with Just a Few Labels: A Semi-supervised Approach Using Sampled Packets"☆35Apr 29, 2019Updated 6 years ago
- A scikit-learn-compatible module for Isolation-based anomaly detection using nearest-neighbor ensembles☆12Aug 30, 2023Updated 2 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆42Jul 17, 2020Updated 5 years ago
- Code for CVPR2018 "Iterative Learning with Open-set Noisy Labels"☆12Mar 12, 2021Updated 5 years ago
- Online multiclass boosting algorithm that uses VFDT as weak learners☆17Oct 24, 2018Updated 7 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆17Feb 27, 2025Updated last year
- 机器学习应用平台/数据预测/文本分类☆12May 24, 2019Updated 6 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated 2 years ago
- An all in one netflow collector with a web front end. Designed for small networks.☆31May 23, 2015Updated 10 years ago
- 按照会话解包, 然后提取明文txt信息, 让ChatGPT来判断一下是否存在攻击行为☆14Mar 7, 2023Updated 3 years ago
- ☆13Dec 22, 2021Updated 4 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- ☆17Nov 22, 2022Updated 3 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- Official Go implementation of the Ethereum protocol☆19Jul 24, 2018Updated 7 years ago
- Malicious Activity Detection System. Final Year Project. Deep Learning-based solution, which analyses Network Activity sequences to class…☆13Sep 27, 2024Updated last year
- Multi-class Data Description for Out-of-distribution Detection☆22Apr 7, 2021Updated 4 years ago
- [IEEE TKDE] DASVDD: Deep Autoencoding Support Vector Data Descriptor for Anomaly Detection☆16Apr 15, 2023Updated 2 years ago
- NIST's statistical test suite for Random Number Generator (RNG) that apply to GINAR RNG☆18Apr 5, 2019Updated 6 years ago
- VaniSSH is a simple tool for generating vanity SSH public keys that start, contain, or end with specified strings.☆19Sep 21, 2025Updated 6 months ago
- ☆18Aug 22, 2022Updated 3 years ago
- ☆19Feb 28, 2025Updated last year
- This is a Python version of CICFlowmeter-V4.0.☆18Mar 12, 2024Updated 2 years ago
- Implementation about Attention-Based Reward Conditional SeqGAN (AR-CSGAN)☆19Jul 25, 2018Updated 7 years ago
- Just a small svm example to use the libSVM from c++ code☆25Jun 4, 2013Updated 12 years ago
- A protocol reverse engineering tool for industrial binary protocol based on pin tool