dmbb / FlowLens
Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]
☆32Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for FlowLens
- An Efficient Design of Intelligent Network Data Plane☆38Updated last year
- Planter is a modular framework for realising in one-click in-network machine learning algorithms.☆24Updated 5 months ago
- Artifacts accompanying the NSDI '24 paper: Leo: Online ML-based Traffic Classification at Multi-Terabit Line Rate.☆12Updated 8 months ago
- Flowrest: in-switch flow-level classification with random forests☆21Updated 8 months ago
- Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation (INFOCOM22 & ToN23)☆30Updated last year
- In-network detection of network attacks using Random Forests and P4☆20Updated 11 months ago
- ☆21Updated last week
- ☆6Updated last year
- Normalized network traffic entropy-based DDoS detection in P4☆11Updated 6 months ago
- In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches☆14Updated 9 months ago
- Heavy-Hitter detection in P4 switch ASIC using Inter-Packet Gap☆24Updated 3 months ago
- A P4 implementation of Elastic Sketch☆18Updated 5 years ago
- ☆25Updated 4 years ago
- NetHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering☆12Updated 2 years ago
- ☆25Updated 2 years ago
- ☆44Updated 3 years ago
- ☆34Updated 4 years ago
- ☆18Updated last year
- ☆39Updated last year
- ☆12Updated 2 years ago
- "Offloading Real-time DDoS Attack Detection to Programmable Data Planes" P4 description☆35Updated 3 years ago
- Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries☆24Updated 2 years ago
- ☆13Updated 2 years ago
- Aggregate-Based Congestion Control for Pulse-Wave DDoS Defense☆50Updated 2 years ago
- Unofficial P4_16 implementation of the HashPipe heavy hitter detection algorithm proposed in the paper, "Heavy-Hitter Detection Entirely …☆19Updated 4 years ago
- Mitigating Network Covert Channels while Preserving Performance☆18Updated 4 years ago
- ☆27Updated 4 years ago
- Source code of "Network-Wide Routing-Oblivious Heavy Hitters" paper by Ran Ben Basat, Gil Einziger, Shir Landau Feibish, Jalil Moraney, a…☆6Updated 5 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆16Updated last year
- Poise source code repo☆12Updated 4 years ago