hbiaodu-git / MixBrokerLinks
☆14Updated last year
Alternatives and similar repositories for MixBroker
Users that are interested in MixBroker are comparing it to the libraries listed below
Sorting:
- ☆14Updated 3 years ago
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆33Updated 11 months ago
- ☆22Updated 3 years ago
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆11Updated 9 months ago
- ☆13Updated 2 years ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆17Updated 11 months ago
- ☆11Updated 7 months ago
- ☆12Updated 3 years ago
- ☆12Updated last year
- Implementation of "Website Fingerprinting at Internet Scale"☆23Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆20Updated last year
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆40Updated last year
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆69Updated 3 years ago
- Implementation of AppScanner☆42Updated 2 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆52Updated last year
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆26Updated 5 months ago
- ☆19Updated 4 years ago
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆22Updated 6 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆51Updated 3 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- ☆84Updated last year
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆26Updated 3 years ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Updated 5 years ago
- ☆19Updated last year
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆55Updated 5 months ago
- Surakav Implementation☆16Updated last year
- IDS abnormal traffic detection tensorflow☆39Updated 5 years ago
- NEGSC☆37Updated last year
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆71Updated last year