cslfiu / IoTCryptojacking
Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".
☆10Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for IoTCryptojacking
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆15Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆61Updated last year
- Adversarial machine learning and explainable machine learning for cyber security☆10Updated 2 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆58Updated last year
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆49Updated last year
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆14Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆28Updated last year
- IoT Attack Detection with machine learning☆17Updated 4 months ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆14Updated 2 years ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆22Updated 8 months ago
- Traffic analysis for Tor-based malware detection and classification☆38Updated last year
- Detection of network traffic anomalies using unsupervised machine learning☆24Updated 2 years ago
- Malware Classification using Machine learning☆69Updated this week
- ☆30Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆56Updated 2 years ago
- ☆15Updated 3 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆70Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆40Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆13Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆128Updated last year
- CICIDS2017 dataset☆54Updated 2 years ago
- Packet Representation Learning for Traffic Classification☆27Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆27Updated 4 months ago
- AI-enabled Cybersecurity for Future Smart Environments☆19Updated 3 months ago
- source code for USENIX Security paper xNIDS☆34Updated 2 months ago
- Application of novel EC-GAN method on Network Intrusion Detection☆18Updated 2 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆16Updated 3 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆17Updated 4 years ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆18Updated 4 years ago