benradford / replication_arxiv_1805_03735
Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic
☆11Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for replication_arxiv_1805_03735
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆16Updated 3 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 4 years ago
- Encrypted Traffic Classification using Deep Learning☆47Updated 6 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆20Updated 5 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated 3 months ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆39Updated 6 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆17Updated 4 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆16Updated 3 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆69Updated 9 months ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆13Updated 3 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆9Updated last year
- Encrypted network traffic Classification☆8Updated 5 years ago
- This repository contains the code used and developed during a master thesis at DTU Compute in 2018☆43Updated 6 years ago
- ☆24Updated last year
- ☆10Updated 5 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆48Updated 4 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Updated 5 years ago
- SSH traffic analysis☆23Updated 5 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆32Updated 4 years ago
- cool project☆18Updated 3 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆15Updated 5 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆14Updated 2 years ago
- ☆13Updated 4 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆27Updated 4 months ago
- ☆16Updated 3 years ago
- ☆14Updated 4 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆37Updated 5 years ago
- Multitask Learning Approach for Network Traffic Classification☆53Updated 5 years ago