cdpxe / NetworkCovertChannelsLinks
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
☆16Updated 2 months ago
Alternatives and similar repositories for NetworkCovertChannels
Users that are interested in NetworkCovertChannels are comparing it to the libraries listed below
Sorting:
- A free online class on network information hiding/steganography/covert channels.☆101Updated last month
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17Updated 4 years ago
- A logic-based enterprise network security analyzer☆125Updated 2 years ago
- IoT and Operational Technology Honeypot☆104Updated last year
- ☆55Updated 6 years ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆69Updated 10 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆75Updated 11 months ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Code for shelLM tool☆54Updated 4 months ago
- A list of attacks or malware using steganography or information hiding☆64Updated last year
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆33Updated last year
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆63Updated last year
- ☆33Updated 2 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated 2 weeks ago
- ☆22Updated last year
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆126Updated last week
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- ICS Cybersecurity PCAP respository☆53Updated 6 years ago
- An Adaptive Misuse Detection System☆40Updated 7 months ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated 10 months ago
- ☆48Updated last year
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆44Updated last month
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆17Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆46Updated last year
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- A collection of resources for security data☆41Updated 7 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆51Updated 3 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆42Updated 2 years ago