The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinting attacks.
☆31Jan 26, 2025Updated last year
Alternatives and similar repositories for Multitab-WF-Datasets
Users that are interested in Multitab-WF-Datasets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆168Apr 6, 2026Updated last month
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆67Jan 2, 2024Updated 2 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆57Jun 14, 2024Updated last year
- ☆27Sep 20, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆24Oct 30, 2020Updated 5 years ago
- This repository contains the source code for a network traffic occlusion framework presented at the 2025 IEEE Symposium on Security and P…☆33May 15, 2025Updated last year
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆198Mar 25, 2023Updated 3 years ago
- Surakav Implementation☆20May 14, 2024Updated 2 years ago
- ☆30Oct 7, 2025Updated 7 months ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆55Dec 31, 2021Updated 4 years ago
- ☆13May 15, 2022Updated 4 years ago
- Codes for WF attacks, defenses☆89Nov 23, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆24May 24, 2025Updated 11 months ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆15Mar 10, 2024Updated 2 years ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆21Jul 6, 2024Updated last year
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆35Aug 28, 2022Updated 3 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆16Feb 27, 2024Updated 2 years ago
- ☆13Feb 15, 2020Updated 6 years ago
- ☆22Jun 20, 2024Updated last year
- IPv6 analysis tool: the other side☆36Jan 5, 2014Updated 12 years ago
- 网络流量分类对比方法汇总☆209May 17, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆16Jun 27, 2017Updated 8 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆20Jun 15, 2020Updated 5 years ago
- ☆29Apr 13, 2026Updated last month
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆73Dec 7, 2025Updated 5 months ago
- The repository of ET-BERT, a network traffic classification model on encrypted traffic. The work has been accepted as The Web Conference …☆640Nov 6, 2025Updated 6 months ago
- Traffic dataset USTC-TFC2016☆175Jun 21, 2019Updated 6 years ago
- eBPF program to inject IPv6 Extension Headers on egress☆12May 11, 2024Updated 2 years ago
- Encrypted Network Traffic Classification using Deep Learning☆59Apr 3, 2024Updated 2 years ago
- The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in rea…☆442Nov 5, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code for S&P (Oakland) 2023 paper "GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text…☆14Feb 13, 2024Updated 2 years ago
- It is a network traffic classifier based on deep learning.☆53Mar 16, 2024Updated 2 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated 2 years ago
- ☆22Feb 14, 2020Updated 6 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- nPrintML creates and runs full ML-based traffic analysis pipelines using nPrint and AutoML.☆59Jan 24, 2024Updated 2 years ago
- Code release for paper "How good is my GAN?"☆12Mar 9, 2019Updated 7 years ago