Rule Extraction from Unsupervised Anomaly Detection in Security
☆23Apr 23, 2025Updated 10 months ago
Alternatives and similar repositories for UAD-Rule-Extraction
Users that are interested in UAD-Rule-Extraction are comparing it to the libraries listed below
Sorting:
- ☆11Oct 7, 2023Updated 2 years ago
- ☆13Feb 15, 2020Updated 6 years ago
- ☆31Oct 14, 2023Updated 2 years ago
- source code for USENIX Security paper xNIDS☆58Aug 27, 2024Updated last year
- The pytorch implementation of DCI (SIGIR2021).☆34Apr 20, 2023Updated 2 years ago
- ☆20Mar 25, 2024Updated last year
- ☆18Jun 16, 2023Updated 2 years ago
- Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation (INFOCOM22 & ToN23)☆41Jun 19, 2023Updated 2 years ago
- In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches☆16Jan 27, 2024Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- Passive DNS Dataset of Domain Resolutions☆18Jun 14, 2022Updated 3 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Planter is a modular framework for realising in one-click in-network machine learning algorithms.☆25Jun 13, 2024Updated last year
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- An Efficient Design of Intelligent Network Data Plane☆59Mar 16, 2023Updated 2 years ago
- ☆31Feb 6, 2025Updated last year
- ☆27Aug 6, 2023Updated 2 years ago
- Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries☆25May 21, 2022Updated 3 years ago
- In-network detection of network attacks using Random Forests and P4☆27Dec 22, 2023Updated 2 years ago
- Flowrest: in-switch flow-level classification with random forests☆35Feb 2, 2026Updated last month
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- ☆37Jan 14, 2025Updated last year
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆138Oct 30, 2023Updated 2 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- ☆40Dec 10, 2021Updated 4 years ago
- This repo contains all the codes and data for 'Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving T…☆39Jan 4, 2023Updated 3 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Official implementation for “HarmonyGuard: Toward Safety and Utility in Web Agents via Adaptive Policy Enhancement and Dual-Objective Opt…☆25Jan 10, 2026Updated last month
- Jewel: Resource-Efficient Joint Packet and Flow Level Inference in Programmable Switches☆12Mar 18, 2024Updated last year
- ☆41Oct 19, 2025Updated 4 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37May 6, 2021Updated 4 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- A nonparametric variational information bottleneck (NVIB) layer in Pytorch☆11Apr 15, 2025Updated 10 months ago