detlearsom / DetGen
Deterministic and monitored traffic generation for inspecting and and training traffic models
☆10Updated this week
Related projects ⓘ
Alternatives and complementary repositories for DetGen
- Attack graph construction and analysis☆34Updated 5 years ago
- ☆14Updated 3 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆58Updated last year
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 4 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT☆41Updated 5 years ago
- IDS Alert Prioritization INSuRE Research Project☆17Updated 5 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆103Updated 2 years ago
- Coburg Intrusion Detection Data Sets☆48Updated 7 years ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆45Updated 4 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆34Updated 4 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆33Updated 4 months ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆21Updated 5 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆15Updated 5 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆21Updated 4 years ago
- ☆24Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆91Updated last year
- This is a paper list about Machine Learning for IDSes☆86Updated 2 months ago
- ☆30Updated 3 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 2 years ago
- This project contains 10010 ELF files (6165 IoT Botnet of different variant and 3845 benign files)☆9Updated 5 years ago
- System traces dataset generation tool.☆12Updated 2 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆98Updated last year
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆37Updated 6 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆54Updated 4 years ago
- Machine-learning-based intrusion detection☆32Updated 6 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆12Updated 11 months ago
- An automatic packet crafting tool for evading learning-based NIDS☆74Updated 2 years ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆62Updated 3 months ago
- ☆96Updated 4 years ago
- Material from the DARPA Transparent Computing Program☆180Updated 4 years ago