SJTU-dxw / AN-NetView external linksLinks
☆20Mar 25, 2024Updated last year
Alternatives and similar repositories for AN-Net
Users that are interested in AN-Net are comparing it to the libraries listed below
Sorting:
- ☆10Mar 11, 2023Updated 2 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated last year
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆30Aug 28, 2022Updated 3 years ago
- ☆31Oct 14, 2023Updated 2 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Dec 5, 2020Updated 5 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- Source code of FedPrompt☆16May 4, 2022Updated 3 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆60Dec 7, 2025Updated 2 months ago
- A PyTorch implementation of of Anomal-E.☆41Dec 16, 2022Updated 3 years ago
- This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoM…☆43Dec 19, 2025Updated last month
- ☆20Jul 10, 2024Updated last year
- SSL-FEW-SHOT☆17Feb 11, 2020Updated 6 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆21Apr 23, 2025Updated 9 months ago
- Implementation of AppScanner☆47Jul 29, 2022Updated 3 years ago
- ☆19Dec 7, 2020Updated 5 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆138Apr 29, 2024Updated last year
- Word2Vec embeddings over packet capture data n-grams.☆20Mar 24, 2023Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆22Jul 9, 2020Updated 5 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Apr 3, 2024Updated last year
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆60Jan 7, 2025Updated last year
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- 将大容量PCAP按流切分成小PCAP☆24Jun 6, 2023Updated 2 years ago
- Packet Representation Learning for Traffic Classification☆32Dec 19, 2024Updated last year
- ☆23May 15, 2019Updated 6 years ago
- ☆89Dec 14, 2024Updated last year
- ☆24Mar 11, 2022Updated 3 years ago
- ☆77Aug 31, 2025Updated 5 months ago
- source code for USENIX Security paper xNIDS☆58Aug 27, 2024Updated last year
- 网络流量分类对比方法汇总☆206May 17, 2025Updated 8 months ago