Traffic analysis for Tor-based malware detection and classification
☆42Jun 20, 2023Updated 2 years ago
Alternatives and similar repositories for tormalwarefp
Users that are interested in tormalwarefp are comparing it to the libraries listed below
Sorting:
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆54Dec 31, 2021Updated 4 years ago
- Traffic dataset USTC-TFC2016☆162Jun 21, 2019Updated 6 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Dec 15, 2017Updated 8 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 3 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated 2 years ago
- ☆13Feb 15, 2020Updated 6 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Apr 3, 2024Updated last year
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆111Oct 9, 2023Updated 2 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year
- Flow Interaction Graph based attack traffic detection system.☆187May 6, 2024Updated last year
- ☆14Sep 15, 2021Updated 4 years ago
- ☆22Dec 14, 2023Updated 2 years ago
- Plugin packages that provide custom visualizations and analytics capabilities to Trisul Network Analytics.☆17Jan 27, 2026Updated last month
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated last year
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆195Mar 25, 2023Updated 2 years ago
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆20Aug 9, 2023Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆23Apr 23, 2025Updated 10 months ago
- ☆21Apr 19, 2024Updated last year
- ☆16Feb 25, 2026Updated last week
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆22May 24, 2025Updated 9 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Mar 4, 2023Updated 3 years ago
- ☆26Sep 20, 2023Updated 2 years ago
- Detecting Tor Traffic using Deep Learning Techniques☆23Jul 27, 2020Updated 5 years ago
- ☆18Jul 27, 2017Updated 8 years ago
- ☆56Sep 6, 2023Updated 2 years ago
- Code for our submission to IEEE CNS 2022☆24Oct 10, 2023Updated 2 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆64Jan 2, 2024Updated 2 years ago
- It is a network traffic classifier based on deep learning.☆50Mar 16, 2024Updated last year
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆122Jan 8, 2025Updated last year
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆56Jun 14, 2024Updated last year
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 8 months ago
- source code for USENIX Security paper xNIDS☆58Aug 27, 2024Updated last year
- 网络流量分类对比方法汇总☆206May 17, 2025Updated 9 months ago
- 该资源为作者AI安全相关论文的分享知识,包括PPT和PDF版本及原文,希望对您有所帮助。加油~☆33Jan 9, 2025Updated last year
- ☆28May 6, 2021Updated 4 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago