liangw89 / obfs-detection
Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"
☆24Updated 9 years ago
Alternatives and similar repositories for obfs-detection:
Users that are interested in obfs-detection are comparing it to the libraries listed below
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Updated 7 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆36Updated 4 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- ☆25Updated 2 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆22Updated 4 years ago
- Automatic Feature Generation for Website Fingerprinting☆31Updated 7 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- A simple utility to classify packets into flows. It's so simple that only one task is aimed to finish. For Deep Packet Inspection or flo…☆168Updated last year
- Documentation, sample inputs, and sample programs that use the dpkt library☆87Updated 8 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago
- ☆17Updated 2 years ago
- ☆22Updated 5 years ago
- Harvest self-signed certs from Project Sonar Internet-wide scan files and have a look around.☆10Updated 8 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- ☆17Updated 5 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆27Updated 9 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- ☆6Updated 6 years ago
- Ender of Fast-Flux malicious domains.☆27Updated 10 years ago
- A fast parser for DNS pcap data.☆70Updated 8 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆39Updated 2 years ago
- ☆11Updated 7 years ago
- Python bindings for libnetfilter_queue☆21Updated 9 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated 10 months ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago