ayyoob / mud-ie
SDN based system to translate MUD profile to flow rules using Faucet as a controller
☆11Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for mud-ie
- Data and code for TMA 2021 paper "Revisiting IoT Device Identification"☆8Updated 2 years ago
- ☆24Updated last year
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 4 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆16Updated last year
- This program allow you to extract some features from pcap files.☆38Updated last year
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆12Updated 11 months ago
- Machine-learning-based intrusion detection☆31Updated 6 years ago
- This is a paper list about Machine Learning for IDSes☆86Updated 2 months ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆32Updated 4 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆16Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆61Updated last year
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆49Updated last year
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆36Updated 4 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆30Updated 3 years ago
- Network data classifier based on the recurrent neural network.☆22Updated 5 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆27Updated 4 months ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆102Updated 2 years ago
- ☆56Updated last year
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- ☆14Updated 4 years ago
- ☆11Updated 2 years ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆73Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 5 years ago
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆76Updated 10 months ago
- Packet Representation Learning for Traffic Classification☆27Updated last year
- ☆66Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆13Updated 3 years ago
- ☆15Updated 3 years ago
- Traffic analysis for Tor-based malware detection and classification☆38Updated last year