Code for our submission to IEEE CNS 2022
☆24Oct 10, 2023Updated 2 years ago
Alternatives and similar repositories for CNS2022_Code
Users that are interested in CNS2022_Code are comparing it to the libraries listed below
Sorting:
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆55Jun 26, 2024Updated last year
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆50Jul 12, 2024Updated last year
- Coburg Intrusion Detection Data Sets☆51Oct 25, 2017Updated 8 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆19Feb 2, 2023Updated 3 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆195Sep 3, 2023Updated 2 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆39Aug 8, 2020Updated 5 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Jun 12, 2025Updated 9 months ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- ☆56Sep 6, 2023Updated 2 years ago
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆16Feb 19, 2025Updated last year
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- ☆13May 15, 2022Updated 3 years ago
- 自学时写的适合Java安全小白用来学习Java反序列化漏洞的文章和Demo。(随懒狗的学习进度持续更新🐶)。Some articles and demos written during self-study which are suitable for Java Secu…☆12Dec 22, 2021Updated 4 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆676Dec 4, 2023Updated 2 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- ☆12Feb 21, 2022Updated 4 years ago
- ☆31Mar 2, 2018Updated 8 years ago
- ☆34Oct 10, 2018Updated 7 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection☆16Sep 30, 2023Updated 2 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- this_my_ctf☆18Nov 17, 2021Updated 4 years ago
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆17Jun 18, 2024Updated last year
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆111Oct 19, 2023Updated 2 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆199Apr 21, 2023Updated 2 years ago
- AWD 文件监控☆29Sep 14, 2023Updated 2 years ago
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆21Aug 9, 2023Updated 2 years ago
- 书籍、课程和文章汇总☆12Dec 14, 2022Updated 3 years ago
- A simple implentment of Maximum Classifier Discrepancy for Unsupervised Domain Adaptation with pytorch☆14Jun 1, 2020Updated 5 years ago
- source code for USENIX Security paper xNIDS☆59Aug 27, 2024Updated last year
- Re-implementation of the published ECCV '20 paper on reciprocal points for open-set recognition. Currently the state-of-the-art in open-s…☆26Feb 12, 2021Updated 5 years ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆24Sep 22, 2020Updated 5 years ago