arsarabi / llm-device-fingerprints
☆13Updated 10 months ago
Related projects: ⓘ
- 将大容量PCAP按流切分成小PCAP☆13Updated last year
- ☆8Updated 2 years ago
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆38Updated 8 months ago
- ☆30Updated 2 months ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆54Updated 2 years ago
- The project is to detect malware traffic in TLS flows using ML☆32Updated 4 years ago
- ☆15Updated last year
- ☆51Updated 3 weeks ago
- ☆24Updated this week
- 从pcap获取流的基本信息工具☆180Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆12Updated 3 years ago
- ☆14Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆9Updated last year
- 此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu☆12Updated last year
- ☆30Updated 4 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- ☆31Updated last year
- Flow Interaction Graph based attack traffic detection system.☆120Updated 4 months ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆64Updated 3 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 2 months ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆12Updated 9 months ago
- ☆11Updated 3 years ago
- 基于IDS 2018数据集使用LightGBM和XGBoost实现DDoS流量分类 sFlow RT&Mininet流量采集与分类 杭电综合项目实践☆22Updated 3 years ago
- Traffic analysis for Tor-based malware detection and classification☆37Updated last year
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆20Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆69Updated 2 years ago
- ☆48Updated 10 months ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆131Updated 10 months ago
- 2020 西湖论剑恶意流量检测实现代码☆9Updated last year
- 利用强化学习方法 DQN 生成基于机器学习的恶意流量检测模型☆22Updated 2 years ago