andreysfc / generating-encrypted-networkLinks
Script from the paper generating encrypted network. Dataset
☆11Updated 4 years ago
Alternatives and similar repositories for generating-encrypted-network
Users that are interested in generating-encrypted-network are comparing it to the libraries listed below
Sorting:
- ☆19Updated 3 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆48Updated last year
- Generate network packets using generative modeling☆15Updated 2 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆235Updated 3 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Updated 4 years ago
- ☆75Updated 5 months ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Updated 5 years ago
- ☆31Updated 2 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆195Updated 2 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆170Updated 6 years ago
- ☆99Updated 2 years ago
- CICIDS2017 dataset☆70Updated 4 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆54Updated last year
- Encrypted Network Traffic Classification using Deep Learning☆60Updated last year
- Machine Learning in Cybersecurity☆90Updated 8 months ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆50Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26Updated 5 years ago
- The use of machine learning to classify network traffic☆40Updated 5 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Updated 5 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Updated 7 months ago
- ☆24Updated 5 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆18Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆29Updated 2 years ago
- using 2d-cnn to classify network traffic☆21Updated 5 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆92Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Updated 2 years ago
- A tunneled flooding traffic detection system.☆30Updated last year