buihuukhoi / CREMELinks
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection
☆16Updated last year
Alternatives and similar repositories for CREME
Users that are interested in CREME are comparing it to the libraries listed below
Sorting:
- Code for our submission to IEEE CNS 2022☆21Updated last year
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆47Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆95Updated 2 years ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆74Updated 4 years ago
- Insider threat detection via bert☆20Updated 3 years ago
- ☆10Updated 2 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆42Updated last year
- Traffic analysis for Tor-based malware detection and classification☆41Updated 2 years ago
- ☆20Updated 4 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated last year
- A tunneled flooding traffic detection system.☆26Updated 9 months ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 4 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆11Updated last year
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆19Updated 5 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆15Updated 5 years ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆22Updated 5 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆167Updated 3 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 5 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆162Updated 2 years ago
- ☆19Updated 4 years ago
- Material from the DARPA Transparent Computing Program☆205Updated 5 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Updated 4 years ago
- ☆82Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- ☆11Updated 3 years ago
- ☆29Updated 7 years ago
- Network traffic classifier based on machine learning algorithms☆46Updated 3 years ago