kahramankostas / IoTDevID
A Behaviour-Based Fingerprinting Method for Device Identification in the IoT
☆23Updated 2 years ago
Alternatives and similar repositories for IoTDevID:
Users that are interested in IoTDevID are comparing it to the libraries listed below
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆12Updated 2 years ago
- A Behavior-Based Device Identification Method for the IoT☆54Updated 2 months ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT☆44Updated 6 years ago
- Implementation of "How to Achieve High Classification Accuracy with Just a Few Labels: A Semi-supervised Approach Using Sampled Packets"☆33Updated 5 years ago
- IDS abnormal traffic detection tensorflow☆39Updated 5 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆127Updated last year
- ☆58Updated 2 years ago
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆19Updated 4 years ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- using 2d-cnn to classify network traffic☆20Updated 5 years ago
- Encrypted Network Traffic Classification using Deep Learning☆51Updated last year
- 多进程读取pcap,基于五元组分流并提取流量特征。结果输出为csv文件,用于机器学习中对加密流量进行分类☆89Updated 2 years ago
- Deep learning models for network intrusion detection☆35Updated 2 years ago
- Encrypted traffic classification use CNN☆32Updated 4 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆37Updated 3 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆15Updated 5 years ago
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆22Updated 6 years ago
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆84Updated last year
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆33Updated 3 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆40Updated 4 years ago
- ☆19Updated 4 years ago
- ☆46Updated 3 years ago
- 网络流量分类对比方法汇总☆171Updated last year
- An automatic packet crafting tool for evading learning-based NIDS☆79Updated 3 years ago
- 收集了部分将机器学习应用于网络流量分类的论文☆165Updated 4 years ago
- Implementation of AppScanner☆41Updated 2 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆48Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆83Updated 2 years ago
- Self-attentive deep learning method for online traffic classification and its interpretability (CN21 & NetAI20)☆37Updated 9 months ago