Traffic analysis for Tor-based malware detection and classification
☆44Jun 20, 2023Updated 2 years ago
Alternatives and similar repositories for tormalwarefp
Users that are interested in tormalwarefp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆55Dec 31, 2021Updated 4 years ago
- Encrypted Network Traffic Classification using Deep Learning☆59Apr 3, 2024Updated 2 years ago
- Traffic dataset USTC-TFC2016☆174Jun 21, 2019Updated 6 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- Flow Interaction Graph based attack traffic detection system.☆193May 6, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The repository of ET-BERT, a network traffic classification model on encrypted traffic. The work has been accepted as The Web Conference …☆628Nov 6, 2025Updated 5 months ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆134Jan 8, 2025Updated last year
- ☆23Dec 14, 2023Updated 2 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆198Mar 25, 2023Updated 3 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Dec 15, 2017Updated 8 years ago
- Detecting Tor Traffic using Deep Learning Techniques☆23Jul 27, 2020Updated 5 years ago
- ☆13Feb 15, 2020Updated 6 years ago
- Contains python tools for performing website fingerprinting classification as well as fetching web-pages.☆13Aug 27, 2022Updated 3 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Oct 28, 2023Updated 2 years ago
- Pytorch implementation of deep packet: a novel approach for encrypted traffic classification using deep learning☆251Mar 1, 2023Updated 3 years ago
- 网络流量分类对比方法汇总☆207May 17, 2025Updated 11 months ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- Analysis for access-control vulnerabilities in Java Spring Security applications.☆14May 25, 2022Updated 3 years ago
- It is a network traffic classifier based on deep learning.☆53Mar 16, 2024Updated 2 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆57Jun 14, 2024Updated last year
- ☆56Sep 6, 2023Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆18Jul 27, 2017Updated 8 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆19Oct 7, 2023Updated 2 years ago
- code implementation for paper: A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification☆61Feb 28, 2023Updated 3 years ago
- Argus clients program repo☆24Jan 16, 2026Updated 3 months ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72May 4, 2018Updated 8 years ago
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated 2 years ago
- ☆27Sep 20, 2023Updated 2 years ago
- 使用机器学习的恶意加密流量识别系统☆50Jan 8, 2024Updated 2 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- Official code release for the NeurIPS 2021 article Training for the Future: A Simple Gradient Interpolation Loss to Generalize Along Time…☆10Nov 17, 2021Updated 4 years ago
- This is a implementation of DRGCN☆14Aug 18, 2022Updated 3 years ago
- this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for it…☆14Sep 5, 2016Updated 9 years ago
- ☆20Jan 12, 2019Updated 7 years ago
- ☆13Mar 22, 2024Updated 2 years ago