论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码
☆33Apr 8, 2022Updated 4 years ago
Alternatives and similar repositories for NetworkTrafficAnalysis
Users that are interested in NetworkTrafficAnalysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 5 years ago
- ☆24Aug 8, 2022Updated 3 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆20Jun 15, 2020Updated 5 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- OCR-APT: Reconstructing APT Stories through Subgraph Anomaly Detection and LLMs.☆34Feb 3, 2026Updated 3 months ago
- ☆21Apr 8, 2026Updated 3 weeks ago
- The codes of paper "TrafficGAN: Off-Deployment Traffic Estimation with Traffic Generative Adversarial Networks".☆16Aug 28, 2020Updated 5 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 6 years ago
- 利用强化学习方法 DQN 生成基于机器学习的恶意流量检测模型☆29Oct 27, 2021Updated 4 years ago
- ☆42Jun 10, 2024Updated last year
- DNS tunneling over DoH Dataset☆11Mar 9, 2023Updated 3 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- ☆14Sep 23, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Mar 27, 2026Updated last month
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37May 6, 2021Updated 4 years ago
- Extract network flow features from PCAP files for machine learning and network analysis☆91Nov 24, 2025Updated 5 months ago
- Machine Learning in Cybersecurity☆92May 23, 2025Updated 11 months ago
- 《基于卷积神经网络(CNN)的网络流量分类》优秀本科毕设相关文档☆76Jun 28, 2021Updated 4 years ago
- Network Traffic Classification with Graph Neural Networks☆12Nov 4, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- Using ML techniques to detect and characterize DDoS traffic using the CIC_DDoS2019 dataset☆25Aug 27, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Data samples for Observability and SIEM☆16Apr 24, 2026Updated last week
- Webshell检测数据集,收集了PHP、JSP、ASP的正常开源代码样本以及恶意Webshell样本。可供Webshell检测研究使用。☆22Dec 11, 2023Updated 2 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- Pysharkfeat is a TLS encrypted traffic feature extraction tool from pcaps written in Python by using Wireshark's command line tshark.☆14Jul 1, 2022Updated 3 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆39Apr 21, 2023Updated 3 years ago
- A reliable mobile-web template built on Vue, Vue-CLI, Vuex, Vue-Router, Vant, Axios, Scss, Mock, Eslint and Viewport adaptation scheme. 基…☆15Jul 26, 2021Updated 4 years ago
- Recurrent Neural Networks for Anomaly Detection using Time Series Data☆21Jun 26, 2016Updated 9 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 基于机器学习的恶意加密流量监测平台☆150May 16, 2021Updated 4 years ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆101Jun 25, 2022Updated 3 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- The code of flow-by-flow network traffic prediction.☆15Aug 14, 2022Updated 3 years ago
- about 5G doc and code☆11Jun 14, 2019Updated 6 years ago
- ☆11May 14, 2020Updated 5 years ago