buihuukhoi / CREMELinks
CREME: A toolchain of automatic dataset collection for machine learning in intrusion detection
☆16Updated 2 years ago
Alternatives and similar repositories for CREME
Users that are interested in CREME are comparing it to the libraries listed below
Sorting:
- Code for our submission to IEEE CNS 2022☆23Updated 2 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆50Updated last year
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated last year
- Using Android Malware Dataset (CICAndMal2017)☆10Updated 6 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆46Updated last year
- Traffic analysis for Tor-based malware detection and classification☆42Updated 2 years ago
- Detecting Tor Traffic using Deep Learning Techniques☆21Updated 5 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Updated last year
- ☆10Updated 3 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 5 years ago
- A tunneled flooding traffic detection system.☆30Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- ☆12Updated 3 years ago
- ☆14Updated 4 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆20Updated 6 months ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆79Updated 4 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆175Updated 2 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Updated 2 years ago
- Insider threat detection via bert☆22Updated 3 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆29Updated 3 years ago
- Packet Representation Learning for Traffic Classification☆32Updated 11 months ago
- 布谷鸟异构图构建,对比学习☆11Updated 3 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆17Updated 2 years ago
- ☆34Updated last year
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 6 years ago
- ☆21Updated 5 years ago
- ☆17Updated 2 years ago