ayyoob / mud-ie
SDN based system to translate MUD profile to flow rules using Faucet as a controller
☆11Updated 6 years ago
Alternatives and similar repositories for mud-ie:
Users that are interested in mud-ie are comparing it to the libraries listed below
- Data and code for TMA 2021 paper "Revisiting IoT Device Identification"☆7Updated 2 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆20Updated 4 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 4 years ago
- Machine-learning-based intrusion detection☆35Updated 6 years ago
- ☆26Updated last year
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 3 years ago
- ☆11Updated 3 years ago
- This is a paper list about Machine Learning for IDSes☆88Updated 6 months ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆16Updated 3 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆135Updated last year
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Updated 6 years ago
- ☆9Updated 7 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆32Updated 3 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Updated 7 years ago
- Network data classifier based on the recurrent neural network.☆22Updated 5 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆12Updated last year
- ☆69Updated 2 years ago
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Updated 6 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆64Updated last year
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆39Updated 6 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆40Updated 9 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆33Updated 7 months ago
- ☆16Updated 4 years ago
- A tool for deriving statistical features from PCAP data☆13Updated 5 years ago
- ☆22Updated 3 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆40Updated 8 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆25Updated 2 years ago