SDN based system to translate MUD profile to flow rules using Faucet as a controller
☆10Jan 31, 2019Updated 7 years ago
Alternatives and similar repositories for mud-ie
Users that are interested in mud-ie are comparing it to the libraries listed below
Sorting:
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- This tool is used for generating Manufacture Usage Description(MUD) from Device Traffic Trace(PCAP)☆31Nov 16, 2022Updated 3 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- ☆13Mar 24, 2017Updated 8 years ago
- A tool for deriving statistical features from PCAP data☆13Nov 21, 2019Updated 6 years ago
- ☆17Mar 2, 2018Updated 8 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- A Deep Packet Inspection application that provides encrypted protocol recognition based on Machine Learning☆21Jun 18, 2018Updated 7 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- Fuzz testing framework for binary programs using AI☆53Sep 13, 2023Updated 2 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- ☆25Mar 24, 2023Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Nov 12, 2022Updated 3 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆28Oct 21, 2022Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆35Nov 22, 2023Updated 2 years ago
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Jun 14, 2021Updated 4 years ago
- scrapped ideas and garbage code☆13May 8, 2021Updated 4 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Stock prediction done using RNN and LTSM to resolve vanishing gradient problem. Dataset used is obtained from Pakistan Stock Exchange☆10Dec 6, 2018Updated 7 years ago
- SDN Firewall IDP project☆13May 31, 2024Updated last year
- All source codes used in "얀데레 아가씨"☆11Aug 6, 2017Updated 8 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆45Aug 1, 2021Updated 4 years ago
- Advanced file format fuzzer based-on deep neural language models.☆41Apr 13, 2023Updated 2 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- SDN Laboratory☆11May 6, 2021Updated 4 years ago
- ☆12Nov 12, 2020Updated 5 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- ☆43Jun 14, 2022Updated 3 years ago