Rule Extraction from Unsupervised Anomaly Detection in Security
☆23Apr 23, 2025Updated 10 months ago
Alternatives and similar repositories for UAD-Rule-Extraction
Users that are interested in UAD-Rule-Extraction are comparing it to the libraries listed below
Sorting:
- ☆11Oct 7, 2023Updated 2 years ago
- ☆13Feb 15, 2020Updated 6 years ago
- ☆31Oct 14, 2023Updated 2 years ago
- source code for USENIX Security paper xNIDS☆58Aug 27, 2024Updated last year
- The pytorch implementation of DCI (SIGIR2021).☆34Apr 20, 2023Updated 2 years ago
- ☆20Mar 25, 2024Updated last year
- ☆18Jun 16, 2023Updated 2 years ago
- Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation (INFOCOM22 & ToN23)☆41Jun 19, 2023Updated 2 years ago
- In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches☆16Jan 27, 2024Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Passive DNS Dataset of Domain Resolutions☆18Jun 14, 2022Updated 3 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Planter is a modular framework for realising in one-click in-network machine learning algorithms.☆25Jun 13, 2024Updated last year
- An Efficient Design of Intelligent Network Data Plane☆58Mar 16, 2023Updated 2 years ago
- ☆31Feb 6, 2025Updated last year
- ☆27Aug 6, 2023Updated 2 years ago
- Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries☆25May 21, 2022Updated 3 years ago
- In-network detection of network attacks using Random Forests and P4☆27Dec 22, 2023Updated 2 years ago
- This repo contains code and visualisation for "Robust moving target defence against false data injection attacks in power grids"☆26Dec 8, 2022Updated 3 years ago
- Flowrest: in-switch flow-level classification with random forests☆35Feb 2, 2026Updated last month
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- ☆37Jan 14, 2025Updated last year
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆137Oct 30, 2023Updated 2 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- ☆40Dec 10, 2021Updated 4 years ago
- This repo contains all the codes and data for 'Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving T…☆39Jan 4, 2023Updated 3 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago
- ☆11Jan 31, 2025Updated last year
- Official implementation for “HarmonyGuard: Toward Safety and Utility in Web Agents via Adaptive Policy Enhancement and Dual-Objective Opt…☆25Jan 10, 2026Updated last month
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Personal notes about the Loongson products☆10Feb 25, 2026Updated last week
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- ☆10Jun 18, 2024Updated last year