ayyoob / mud-ie
SDN based system to translate MUD profile to flow rules using Faucet as a controller
☆10Updated 6 years ago
Alternatives and similar repositories for mud-ie
Users that are interested in mud-ie are comparing it to the libraries listed below
Sorting:
- Data and code for TMA 2021 paper "Revisiting IoT Device Identification"☆7Updated 2 years ago
- ☆27Updated last year
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 5 years ago
- ☆15Updated last year
- This program allow you to extract some features from pcap files.☆38Updated 2 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Updated 3 years ago
- This is a paper list about Machine Learning for IDSes☆89Updated 8 months ago
- A tunneled flooding traffic detection system.☆19Updated 5 months ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆23Updated 4 years ago
- Network Traffic Identification with Convolutional Neural Networks☆24Updated 6 years ago
- ☆24Updated 11 months ago
- Machine-learning-based intrusion detection☆37Updated 6 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT☆44Updated 6 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆27Updated 5 months ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆49Updated 4 years ago
- ☆11Updated 3 years ago
- ☆23Updated 6 months ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆22Updated 4 years ago
- ☆18Updated 4 years ago
- A Behavior-Based Device Identification Method for the IoT☆56Updated 2 months ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Updated 4 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆25Updated 3 years ago
- ☆58Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆34Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆67Updated last month
- An automatic packet crafting tool for evading learning-based NIDS☆80Updated 3 years ago
- ☆70Updated 2 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆17Updated last year