amsadeghzadeh / AdversarialNetworkTrafficView external linksLinks
☆20Jan 20, 2021Updated 5 years ago
Alternatives and similar repositories for AdversarialNetworkTraffic
Users that are interested in AdversarialNetworkTraffic are comparing it to the libraries listed below
Sorting:
- ☆14Sep 15, 2021Updated 4 years ago
- ☆13May 15, 2022Updated 3 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- ☆58Dec 8, 2022Updated 3 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- ☆13Sep 23, 2024Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆27Sep 21, 2024Updated last year
- 将大容量PCAP按流切分成小PCAP☆24Jun 6, 2023Updated 2 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated last year
- ☆24Mar 11, 2022Updated 3 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆30Aug 28, 2022Updated 3 years ago
- ☆28May 6, 2021Updated 4 years ago
- code implementation for paper: A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification☆61Feb 28, 2023Updated 2 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Dec 5, 2020Updated 5 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆37Oct 2, 2020Updated 5 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- ☆20Mar 25, 2024Updated last year
- ☆18May 9, 2024Updated last year
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆43Aug 10, 2021Updated 4 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆60Dec 7, 2025Updated 2 months ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆21Apr 23, 2025Updated 9 months ago
- ☆20Jul 10, 2024Updated last year
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆20Aug 9, 2023Updated 2 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago
- Implementation of AppScanner☆47Jul 29, 2022Updated 3 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆80May 25, 2023Updated 2 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆21May 24, 2025Updated 8 months ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago