论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码
☆33Apr 8, 2022Updated 3 years ago
Alternatives and similar repositories for NetworkTrafficAnalysis
Users that are interested in NetworkTrafficAnalysis are comparing it to the libraries listed below
Sorting:
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 4 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆19Jun 15, 2020Updated 5 years ago
- ☆23Aug 8, 2022Updated 3 years ago
- The codes of paper "TrafficGAN: Off-Deployment Traffic Estimation with Traffic Generative Adversarial Networks".☆16Aug 28, 2020Updated 5 years ago
- ☆21Jan 27, 2025Updated last year
- ☆22Jan 12, 2024Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- ☆36Jun 10, 2024Updated last year
- 《基于卷积神经网络(CNN)的网络流量分类》优秀本科毕设相关文档☆75Jun 28, 2021Updated 4 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- This program allow you to extract some features from pcap files.☆39Apr 4, 2023Updated 2 years ago
- Extract network flow features from PCAP files for machine learning and network analysis☆92Nov 24, 2025Updated 3 months ago
- A reliable mobile-web template built on Vue, Vue-CLI, Vuex, Vue-Router, Vant, Axios, Scss, Mock, Eslint and Viewport adaptation scheme. 基…☆15Jul 26, 2021Updated 4 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37May 6, 2021Updated 4 years ago
- IATHook 测试例子☆10Jan 8, 2020Updated 6 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated 11 months ago
- Data samples for Observability and SIEM☆15Oct 29, 2025Updated 4 months ago
- DNS tunneling over DoH Dataset☆11Mar 9, 2023Updated 2 years ago
- ☆12Jun 19, 2024Updated last year
- Machine Learning in Cybersecurity☆91May 23, 2025Updated 9 months ago
- The use of machine learning to classify network traffic☆40Aug 28, 2020Updated 5 years ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆101Jun 25, 2022Updated 3 years ago
- CRISPR, faster, better – The Crackling method for whole-genome target detection☆10Jan 11, 2024Updated 2 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- ☆14Feb 26, 2025Updated last year
- ☆13Sep 23, 2024Updated last year
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- Identifying malicious/benign network traffic using classification methods.☆10Sep 27, 2022Updated 3 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- An efficient Lexer and recursive decent parser for c++ language. Implemented in Python☆12Jan 9, 2021Updated 5 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- about 5G doc and code☆11Jun 14, 2019Updated 6 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago