kahramankostas / IoTDevIDv2Links
A Behavior-Based Device Identification Method for the IoT
☆56Updated 4 months ago
Alternatives and similar repositories for IoTDevIDv2
Users that are interested in IoTDevIDv2 are comparing it to the libraries listed below
Sorting:
- ☆84Updated last year
- ☆47Updated last year
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆43Updated 6 years ago
- A Behaviour-Based Fingerprinting Method for Device Identification in the IoT☆26Updated 2 years ago
- ☆48Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆83Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆35Updated 4 years ago
- ☆19Updated 3 years ago
- Journal Article: Telematics and Informatics Reports☆12Updated 2 years ago
- ☆42Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆80Updated 3 years ago
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆89Updated last year
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆16Updated last year
- ☆24Updated last year
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆40Updated last year
- CICIDS2017 dataset☆70Updated 3 years ago
- ☆18Updated 4 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 4 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆34Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆112Updated 2 years ago
- Generate synthetic network attack packet flows using generative adversarial networks.☆29Updated 4 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 3 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆84Updated 3 years ago
- IDS abnormal traffic detection tensorflow☆39Updated 5 years ago
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆13Updated 3 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆22Updated 3 years ago