malfp / tormalwarefpLinks
Traffic analysis for Tor-based malware detection and classification
☆42Updated 2 years ago
Alternatives and similar repositories for tormalwarefp
Users that are interested in tormalwarefp are comparing it to the libraries listed below
Sorting:
- Flow Interaction Graph based attack traffic detection system.☆180Updated last year
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆131Updated 2 years ago
- Materials about Encrypted Traffic Analysis☆288Updated this week
- Traffic dataset USTC-TFC2016☆152Updated 6 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆119Updated 2 months ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆59Updated 11 months ago
- Extract network flow features from PCAP files for machine learning and network analysis☆92Updated 2 weeks ago
- ☆54Updated 2 years ago
- It is a network traffic classifier based on deep learning.☆49Updated last year
- A tunneled flooding traffic detection system.☆29Updated last year
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆96Updated 3 years ago
- Toolkit for processing PCAP file and transform into image of MNIST dataset☆251Updated last year
- Implementation of AppScanner☆44Updated 3 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆111Updated 2 years ago
- 从pcap获取流的基本信息工具☆228Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Updated 3 years ago
- 网络流量分类对比方法汇总☆202Updated 6 months ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆51Updated last year
- ☆82Updated 10 months ago
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆127Updated last year
- ☆20Updated 4 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆61Updated last year
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆92Updated last year
- 收集了部分将机器学习应用于网络流量分类的论文☆173Updated 5 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆29Updated 10 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- source code for USENIX Security paper xNIDS☆58Updated last year
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆192Updated 2 years ago
- ☆25Updated 2 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆57Updated this week