CuiTianyu961030 / 6GANLinks
The repository of 6GAN, an IPv6 multi-pattern target generation algorithm using Generative Adversarial Nets with reinforcement learning. The work has been accepted as INFOCOM 2021 accepted Paper.
☆20Updated 3 years ago
Alternatives and similar repositories for 6GAN
Users that are interested in 6GAN are comparing it to the libraries listed below
Sorting:
- ☆20Updated last year
- ☆11Updated last year
- Space tree search algorithm for IPv6 active addresses and aliased regions☆11Updated 4 years ago
- 6Graph is an efficient IPv6 address generator☆23Updated 3 years ago
- 用python复现 《Target Generation for Internet-wide IPv6 Scanning 》的6Gen算法☆13Updated 6 years ago
- 从pcap获取流的基本信息工具☆218Updated last year
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆128Updated last year
- Efficient IPv6 address discovery algorithm DET which combines density, information entropy and space tree. DET is short for detective, w…☆13Updated last year
- ZMapv6: Internet Scanner with IPv6 capabilities☆111Updated 4 months ago
- AddrMiner/AddrMiner☆6Updated last year
- Flow Interaction Graph based attack traffic detection system.☆163Updated last year
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- Source code supporting Akamai's Custom Analytics project: http://entropy-ip.com/☆27Updated 6 years ago
- 多进程读取pcap,基于五元组分流并提取流量特征。结果输出为csv文件,用于机器学习中对加密流量进行分类☆92Updated 2 years ago
- 网络流量领域工具库、公开数据集及加密流量解析方法☆73Updated 2 years ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated 2 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆114Updated 3 years ago
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆13Updated 3 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆20Updated last year
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆51Updated 3 years ago
- ☆19Updated last year
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆26Updated 5 months ago
- 🔫基于scapy的SSL/TLS特征提取工具及相应随机森林分类器模型☆20Updated 5 years ago
- ☆22Updated 5 years ago
- 基于IDS 2018数据集使用LightGBM和XGBoost实现DDoS流量分类 sFlow RT&Mininet流量采集与分类 杭电综合项目实践☆29Updated 4 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆14Updated 3 weeks ago
- It is a network traffic classifier based on deep learning.☆46Updated last year
- Implementation of AppScanner☆42Updated 2 years ago
- Implementation of "Website Fingerprinting at Internet Scale"☆23Updated 2 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆41Updated 4 years ago