An automatic packet crafting tool for evading learning-based NIDS
☆85Jan 13, 2022Updated 4 years ago
Alternatives and similar repositories for TrafficManipulator
Users that are interested in TrafficManipulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆373Apr 14, 2024Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- Non-official implementation of Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection☆23Jun 8, 2022Updated 3 years ago
- ☆15Mar 24, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- wx☆11Aug 14, 2022Updated 3 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆81May 25, 2023Updated 2 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- ☆20Mar 25, 2024Updated 2 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆139Oct 30, 2023Updated 2 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Oct 18, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆55Jun 26, 2024Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Code for our submission to the WTMC 2021 workshop☆14Jul 14, 2021Updated 4 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- ☆29May 6, 2021Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- ☆13Sep 23, 2024Updated last year
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆22Aug 24, 2021Updated 4 years ago
- ACDWM (Adaptive Chunk-based Dynamic Weighted Majority)☆10Nov 7, 2019Updated 6 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- 网络流量分类对比方法汇总☆206May 17, 2025Updated 10 months ago
- ☆14Apr 26, 2022Updated 3 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- ☆24Mar 11, 2022Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆51Jul 12, 2024Updated last year
- This is a Python version of CICFlowmeter-V4.0.☆18Mar 12, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Algorithms of rule extraction from neural networks☆35Mar 24, 2023Updated 3 years ago
- Flow Interaction Graph based attack traffic detection system.☆189May 6, 2024Updated last year
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 11 months ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- A network intrusion detection system using machine learning. Naive Bayes, Decision Tree machine learning algorithm are used in this proje…☆15Dec 12, 2016Updated 9 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆36Aug 18, 2024Updated last year
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆61Jan 7, 2025Updated last year