Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN based on Random host mutation technique. Developed the a new routing mechanism using north bound API provided by controller using multithreading, decorators, event creation & event handling techniques. Perform…
☆28Mar 18, 2018Updated 8 years ago
Alternatives and similar repositories for Moving-Target-Defense-RHM-using-SDN
Users that are interested in Moving-Target-Defense-RHM-using-SDN are comparing it to the libraries listed below
Sorting:
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Security management in SDN using Reinforcement Learning☆14Dec 8, 2022Updated 3 years ago
- ☆16Aug 30, 2022Updated 3 years ago
- Official source code of the paper: Perturbation Seeking Generative Adversarial Networks: A Defense Framework for Remote Sensing Image Sce…☆14Jan 6, 2022Updated 4 years ago
- This repo contains code and visualisation for "Robust moving target defence against false data injection attacks in power grids"☆26Dec 8, 2022Updated 3 years ago
- ☆11Apr 21, 2021Updated 4 years ago
- ☆13Nov 27, 2024Updated last year
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Programmed the SDN controller to monitor the traffic, predict the traffic behaviour and detect DDOS traffic in the cloud network and miti…☆62Oct 8, 2020Updated 5 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- GLEE: Geometric Laplacian Eigenmap Embedding☆11Mar 7, 2020Updated 6 years ago
- Project holding the implementation and results of my thesis project at University of Trento, Italy☆20Jun 21, 2020Updated 5 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Aug 12, 2017Updated 8 years ago
- Solves a Mixed Integer Linear Program to generate the Stacklberg Equilibrium of a General-sum (+Bayesian) Games.☆36Jan 9, 2026Updated 2 months ago
- Reinforcement Learning tool for Network Slice Placement problems☆28May 4, 2024Updated last year
- This repo contains all the codes and data for 'Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving T…☆38Jan 4, 2023Updated 3 years ago
- Ryu component-based software defined networking framework☆31Sep 17, 2021Updated 4 years ago
- This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and H…☆23Jun 26, 2023Updated 2 years ago
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- DRL-M4MR: An intelligent multicast routing approach based on DQN deep reinforcement learning in SDN☆69Nov 27, 2024Updated last year
- This repository describes the demonstration of encrypted network traffic classification in SDN environment. A testbed is created using Mi…☆24Nov 17, 2022Updated 3 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- 欺骗防御Linux版本Agent☆13Jul 26, 2021Updated 4 years ago
- Enjoy your typos☆12Oct 7, 2022Updated 3 years ago
- A book to introduce Mininet usage and its code implementation.☆56Jun 15, 2018Updated 7 years ago
- Deep Reinforcement Learning Based Dynamic Resource Allocation in 5G Ultra-Dense Networks☆33Nov 21, 2021Updated 4 years ago
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆31Apr 15, 2025Updated 11 months ago
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆11Apr 22, 2021Updated 4 years ago
- Visualizations of music semantics calculus using Spotify and deep embeddings.☆17Aug 5, 2023Updated 2 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- Zero Trust Bitcoin Options on Ethereum☆12Jun 4, 2021Updated 4 years ago
- MPLS network implementations using FRRouting☆16Apr 17, 2022Updated 3 years ago
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- VoIP honeypot system☆22Apr 2, 2024Updated last year
- Accepted by AROB 2021. A car-agent navigates in complex traffic conditions by Mixed_Input_PPO_CNN_LSTM model.☆14May 22, 2021Updated 4 years ago