ayyoob / mud-ieLinks
SDN based system to translate MUD profile to flow rules using Faucet as a controller
☆10Updated 6 years ago
Alternatives and similar repositories for mud-ie
Users that are interested in mud-ie are comparing it to the libraries listed below
Sorting:
- Data and code for TMA 2021 paper "Revisiting IoT Device Identification"☆7Updated 2 years ago
- ☆27Updated last year
- This is a paper list about Machine Learning for IDSes☆89Updated 10 months ago
- Machine-learning-based intrusion detection☆38Updated 6 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 5 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆12Updated last year
- Network data classifier based on the recurrent neural network.☆21Updated 6 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆74Updated last year
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 3 years ago
- ☆9Updated 7 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- This repository contains the code used and developed during a master thesis at DTU Compute in 2018☆43Updated 7 years ago
- ☆14Updated 4 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 7 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆45Updated last year
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Updated 3 years ago
- ☆25Updated last year
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆40Updated last year
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 4 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆138Updated 2 years ago
- ☆70Updated 2 years ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆29Updated 4 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆26Updated 3 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆18Updated 4 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆43Updated 6 years ago
- A tunneled flooding traffic detection system.☆24Updated 6 months ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆23Updated 4 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆25Updated 2 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆25Updated 5 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆80Updated 3 years ago