huyz97 / darknet-dataset-2020Links
Tor, I2P, ZeroNet, Freenet traffic data
☆32Updated 3 years ago
Alternatives and similar repositories for darknet-dataset-2020
Users that are interested in darknet-dataset-2020 are comparing it to the libraries listed below
Sorting:
- Traffic analysis for Tor-based malware detection and classification☆39Updated 2 years ago
- Flow Interaction Graph based attack traffic detection system.☆163Updated last year
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆128Updated last year
- using deep learning to classify the encrypted network traffic☆161Updated 4 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆41Updated 4 years ago
- ☆26Updated 4 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆52Updated last year
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆106Updated last year
- 网络流量领域工具库、公开数据集及加密流量解析方法☆71Updated 2 years ago
- 多进程读取pcap,基于五元组分流并提取流量特征。结果输出为csv文件,用于机器学习中对加密流量进行分类☆92Updated 2 years ago
- Original implementation of FlowPrint as in the NDSS '20 paper☆117Updated 2 years ago
- nPrintML creates and runs full ML-based traffic analysis pipelines using nPrint and AutoML.☆54Updated last year
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆51Updated 3 years ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆48Updated 4 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆112Updated 3 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆179Updated 2 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Updated 3 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆14Updated 3 weeks ago
- ☆47Updated last year
- Codes for WF attacks, defenses☆83Updated last year
- Implementation of AppScanner☆42Updated 2 years ago
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆89Updated last year
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆45Updated last year
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆88Updated 5 months ago
- Materials about Encrypted Traffic Analysis☆174Updated 2 weeks ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆25Updated 2 weeks ago
- Traffic dataset USTC-TFC2016☆136Updated 6 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Updated 4 years ago
- 网络流量分类对比方法汇总☆181Updated last month
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆9Updated 10 months ago