A SDN project to implement moving target defense
☆11Nov 21, 2014Updated 11 years ago
Alternatives and similar repositories for mtd
Users that are interested in mtd are comparing it to the libraries listed below
Sorting:
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 7 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Official source code of the paper: Perturbation Seeking Generative Adversarial Networks: A Defense Framework for Remote Sensing Image Sce…☆14Jan 6, 2022Updated 4 years ago
- 网络安全态势感知新闻平台(前台)☆20Jun 27, 2018Updated 7 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆38Feb 7, 2019Updated 7 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Solves a Mixed Integer Linear Program to generate the Stacklberg Equilibrium of a General-sum (+Bayesian) Games.☆36Jan 9, 2026Updated last month
- SDN NFV architecture for DDoS mitigation with reinforcement learning: An implementation with ONOS and Containernet☆10Sep 1, 2024Updated last year
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- OrientDB Module for Play! framework☆24Aug 4, 2013Updated 12 years ago
- c语言实现的能在windows和linux下运行的http服务器,支持动态页面☆11Jul 18, 2016Updated 9 years ago
- Agentless network interfaces monitor for GNU/Linux firewalls/servers☆17Apr 4, 2017Updated 8 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- Online Service Function Chain Deployment for Live-Video virtualized Content Delivery Networks, a Deep Reinforcement Learning approach pap…☆10Nov 8, 2021Updated 4 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- ☆11May 7, 2015Updated 10 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- A library for python-based application logging and data collection☆19Aug 29, 2018Updated 7 years ago
- High-level library for executable binary file analysis☆16Feb 13, 2017Updated 9 years ago
- Convolutional Neural Network Based Optimization Approach for Wireless Resource Management☆10Apr 7, 2021Updated 4 years ago
- Python module for the AM2302 temperature/humidity sensor on a Raspberry Pi.☆11Jan 6, 2017Updated 9 years ago
- linux 核心模組, 使用 netfilter IPv4 hook 監聽和分析 DNS 請求和回應封包.☆14Oct 25, 2018Updated 7 years ago
- Try harder to bypass that WAF...☆13Jan 4, 2015Updated 11 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago
- ☆10Apr 30, 2017Updated 8 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- ☆11Apr 21, 2021Updated 4 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- ☆20Jun 25, 2013Updated 12 years ago
- HOL Guidebook☆12Oct 11, 2024Updated last year
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- ☆12Oct 17, 2022Updated 3 years ago