An automatic packet crafting tool for evading learning-based NIDS
☆85Jan 13, 2022Updated 4 years ago
Alternatives and similar repositories for TrafficManipulator
Users that are interested in TrafficManipulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆74Dec 16, 2021Updated 4 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆385Mar 24, 2026Updated last month
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆75Apr 6, 2025Updated last year
- Non-official implementation of Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection☆24Jun 8, 2022Updated 3 years ago
- ☆15Mar 24, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- wx☆11Aug 14, 2022Updated 3 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆81May 25, 2023Updated 2 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- ☆21Mar 25, 2024Updated 2 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆18Oct 18, 2023Updated 2 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆58Jun 26, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- Code for our submission to the WTMC 2021 workshop☆15Jul 14, 2021Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- ☆14Sep 23, 2024Updated last year
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆22Aug 24, 2021Updated 4 years ago
- ACDWM (Adaptive Chunk-based Dynamic Weighted Majority)☆10Nov 7, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- 网络流量分类对比方法汇总☆207May 17, 2025Updated 11 months ago
- ☆13Apr 26, 2022Updated 4 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆52Jul 12, 2024Updated last year
- ☆25Mar 11, 2022Updated 4 years ago
- This is a Python version of CICFlowmeter-V4.0.☆18Mar 12, 2024Updated 2 years ago
- Algorithms of rule extraction from neural networks☆35Mar 24, 2023Updated 3 years ago
- Flow Interaction Graph based attack traffic detection system.☆193May 6, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated last year
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- A network intrusion detection system using machine learning. Naive Bayes, Decision Tree machine learning algorithm are used in this proje…☆15Dec 12, 2016Updated 9 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆63Jan 7, 2025Updated last year
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆78Oct 11, 2021Updated 4 years ago