JG91 / CNNPRELinks
CNNPRE: A CNN-Based Protocol Reverse Engineering Method
☆10Updated 2 years ago
Alternatives and similar repositories for CNNPRE
Users that are interested in CNNPRE are comparing it to the libraries listed below
Sorting:
- List of (automatic) protocol reverse engineering tools for network protocols☆179Updated last year
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Updated last year
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆121Updated 2 weeks ago
- ☆38Updated last year
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆69Updated 2 years ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆364Updated 5 months ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆663Updated 2 years ago
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14Updated 4 years ago
- A logic-based enterprise network security analyzer☆135Updated 2 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆160Updated 3 months ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆26Updated 2 months ago
- ☆127Updated 5 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- ☆34Updated 2 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- ☆22Updated 5 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆44Updated 7 years ago
- ☆24Updated 4 months ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆52Updated 8 months ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Updated 2 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆193Updated 2 years ago
- Material from the DARPA Transparent Computing Program☆221Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆54Updated 3 months ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆240Updated 3 weeks ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆16Updated 4 years ago