detlearsom / DetGen
Deterministic and monitored traffic generation for inspecting and and training traffic models
☆10Updated 3 months ago
Alternatives and similar repositories for DetGen:
Users that are interested in DetGen are comparing it to the libraries listed below
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆41Updated 7 months ago
- This is a paper list about Machine Learning for IDSes☆88Updated 5 months ago
- IDS Alert Prioritization INSuRE Research Project☆17Updated 5 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆64Updated last year
- Coburg Intrusion Detection Data Sets☆49Updated 7 years ago
- Attack graph construction and analysis☆34Updated 5 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆15Updated 5 years ago
- ☆14Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 5 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT☆43Updated 6 years ago
- Simple Network Intrusion Detection System. In python with Scapy.☆37Updated 5 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆105Updated 2 years ago
- nPrintML creates and runs full ML-based traffic analysis pipelines using nPrint and AutoML.☆50Updated last year
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 4 years ago
- ☆30Updated 4 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆32Updated 9 months ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆62Updated last year
- A collection of resources for security data☆40Updated 7 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆102Updated last year
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆47Updated 4 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆34Updated 7 months ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆11Updated 2 years ago
- Material from the DARPA Transparent Computing Program☆190Updated 4 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Updated 7 years ago
- This project contains 10010 ELF files (6165 IoT Botnet of different variant and 3845 benign files)☆9Updated 5 years ago
- An SDN based security system for Botnet based DDoS attacks.☆14Updated 9 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆50Updated 4 years ago
- Implementation of "How to Achieve High Classification Accuracy with Just a Few Labels: A Semi-supervised Approach Using Sampled Packets"☆32Updated 5 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago