This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our paper, where we performed an extensive analysis of the CICIDS 2017 dataset and the CICFlowMeter tool.
☆57Jun 26, 2024Updated last year
Alternatives and similar repositories for CICFlowMeter
Users that are interested in CICFlowMeter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Non-official implementation of Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection☆24Jun 8, 2022Updated 3 years ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆80Jul 16, 2021Updated 4 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆682Dec 4, 2023Updated 2 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection☆16Sep 30, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆76Aug 31, 2025Updated 7 months ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆197Sep 3, 2023Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆85Jan 13, 2022Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆51Jul 12, 2024Updated last year
- ☆15Mar 24, 2023Updated 3 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- ☆14Apr 26, 2022Updated 3 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- This is a Python version of CICFlowmeter-V4.0.☆18Mar 12, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- ☆20Mar 25, 2024Updated 2 years ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆20Feb 2, 2023Updated 3 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Nov 8, 2020Updated 5 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆379Mar 24, 2026Updated 2 weeks ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆65Jun 22, 2023Updated 2 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Mar 27, 2026Updated last week
- CICFlowmeter written in python for easy to try out☆83Mar 30, 2026Updated last week
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Dec 4, 2025Updated 4 months ago
- Control your Canon Camera wirelessly with Cine Remote's easy-to-use interface.☆67Mar 3, 2025Updated last year
- Packet Construction Set☆10Nov 20, 2017Updated 8 years ago
- ☆17Jun 26, 2024Updated last year
- getopt for vcpkg☆11Aug 20, 2025Updated 7 months ago
- ☆19Feb 22, 2022Updated 4 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Coburg Intrusion Detection Data Sets☆51Oct 25, 2017Updated 8 years ago
- LDAP Admin User Group Managment GUI☆13Oct 2, 2025Updated 6 months ago
- Lets do anomaly detection with keras!☆11Oct 21, 2019Updated 6 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 6 years ago
- ☆13May 15, 2022Updated 3 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆28Oct 21, 2022Updated 3 years ago