dmbb / FlowLens
Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]
☆32Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for FlowLens
- An Efficient Design of Intelligent Network Data Plane☆38Updated last year
- ☆6Updated last year
- In-network detection of network attacks using Random Forests and P4☆20Updated 10 months ago
- Planter is a modular framework for realising in one-click in-network machine learning algorithms.☆24Updated 4 months ago
- Artifacts accompanying the NSDI '24 paper: Leo: Online ML-based Traffic Classification at Multi-Terabit Line Rate.☆11Updated 8 months ago
- Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation (INFOCOM22 & ToN23)☆30Updated last year
- Normalized network traffic entropy-based DDoS detection in P4☆11Updated 6 months ago
- Flowrest: in-switch flow-level classification with random forests☆21Updated 7 months ago
- ☆25Updated 2 years ago
- In-Network Volumetric DDoS Victim Identification Using Programmable Commodity Switches☆14Updated 9 months ago
- ☆19Updated last month
- NetHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering☆12Updated 2 years ago
- ☆39Updated last year
- ☆44Updated 3 years ago
- ☆13Updated 2 years ago
- Heavy-Hitter detection in P4 switch ASIC using Inter-Packet Gap☆24Updated 3 months ago
- ☆34Updated 4 years ago
- Poise source code repo☆12Updated 4 years ago
- In-Network Nmap (Scanner)☆32Updated 2 years ago
- Network-wide heavy hitter detection in P4☆12Updated 4 years ago
- Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries☆24Updated 2 years ago
- ☆21Updated 2 years ago
- ☆12Updated 2 years ago
- A P4 implementation of Elastic Sketch☆18Updated 5 years ago
- ☆25Updated 4 years ago
- Unofficial P4_16 implementation of the HashPipe heavy hitter detection algorithm proposed in the paper, "Heavy-Hitter Detection Entirely …☆19Updated 4 years ago
- Blink: Fast Connectivity Recovery Entirely in the Data Plane☆25Updated 3 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆16Updated last year
- ☆31Updated 8 months ago
- ☆33Updated last year