malfp / tormalwarefp
Traffic analysis for Tor-based malware detection and classification
☆39Updated last year
Alternatives and similar repositories for tormalwarefp:
Users that are interested in tormalwarefp are comparing it to the libraries listed below
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆53Updated 3 months ago
- 网络流量分类对比方法汇总☆171Updated last year
- ☆44Updated last year
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆127Updated last year
- Materials about Encrypted Traffic Analysis☆155Updated this week
- ☆48Updated 3 months ago
- 多进程读取pcap,基于五元组分流并提取流量特征。结果输出为csv文件,用于机器学习中对加密流量进行分类☆90Updated 2 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆40Updated 4 years ago
- Encrypted Network Traffic Classification using Deep Learning☆51Updated last year
- Traffic dataset USTC-TFC2016☆130Updated 5 years ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆79Updated 2 years ago
- Flow Interaction Graph based attack traffic detection system.☆156Updated 11 months ago
- It is a network traffic classifier based on deep learning.☆46Updated last year
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆40Updated last year
- Implementation of AppScanner☆41Updated 2 years ago
- ☆24Updated last year
- ☆19Updated 4 years ago
- WWW'23 Research Paper: TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆86Updated 3 months ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆104Updated last year
- source code for USENIX Security paper xNIDS☆41Updated 7 months ago
- 收集了部分将机器学习应用于网络流量分类的论文☆165Updated 4 years ago
- ☆46Updated 4 months ago
- 网络流量领域工具库、公开数据集及加密流量解析方法☆63Updated last year
- A curation of awesome papers, datasets and tools about network traffic analysis.☆41Updated 5 months ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆15Updated 5 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆48Updated last year
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆50Updated 10 months ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆48Updated 4 years ago
- ☆25Updated 3 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆50Updated 3 years ago