Feature Extraction and Machine Learning from Network Traffic Traces
☆74Aug 1, 2024Updated last year
Alternatives and similar repositories for netml
Users that are interested in netml are comparing it to the libraries listed below
Sorting:
- Internet Censorship Course☆12Dec 2, 2025Updated 3 months ago
- Cost-aware network traffic analysis☆13Dec 20, 2023Updated 2 years ago
- Repository with links to datasets collected by Netrics Internet measurement devices deployed across Chicago by the Internet Innovation In…☆13Nov 26, 2025Updated 3 months ago
- Detection of network traffic anomalies using unsupervised machine learning☆28Jan 26, 2022Updated 4 years ago
- [Usenix Security '25] Robustifying ML-powered Network Classifiers with PANTS☆20Aug 16, 2025Updated 6 months ago
- Netrics - Active Measurements of Internet Performance☆12Sep 14, 2023Updated 2 years ago
- This repository contains the source code for a network traffic occlusion framework presented at the 2025 IEEE Symposium on Security and P…☆27May 15, 2025Updated 9 months ago
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Feb 4, 2024Updated 2 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- The harpoon network traffic generator.☆16Feb 13, 2018Updated 8 years ago
- Run HTTP and HTTPS traceroutes to detect the network location of censoring middleboxes☆18Mar 30, 2023Updated 2 years ago
- AI for Network Monitoring: A collection of data-driven and ML/AI methods for designing efficient Internet monitoring strategies and measu…☆14Sep 26, 2023Updated 2 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆18Aug 3, 2023Updated 2 years ago
- ☆18Jun 16, 2023Updated 2 years ago
- Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.☆23May 19, 2023Updated 2 years ago
- agurim: a multi-dimensional flow aggregation tool☆21Jul 5, 2019Updated 6 years ago
- ☆21Apr 19, 2024Updated last year
- [CIKM'23] Time-aware Graph Structure Learning via Sequence Prediction on Temporal Graphs☆20Aug 9, 2023Updated 2 years ago
- Flow feature extraction tool built in Rust using eBPF☆23Jun 21, 2025Updated 8 months ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Oct 18, 2023Updated 2 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆22May 24, 2025Updated 9 months ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- flowRecorder - a network traffic flow feature measurement tool☆21Jan 14, 2019Updated 7 years ago
- Pure-python library allowing to read the Warts file format produced by Scamper (an Internet measurement tool from CAIDA)☆21Mar 15, 2021Updated 4 years ago
- The Westermo network traffic dataset☆26Apr 18, 2023Updated 2 years ago
- This is a torchvision style CNN models collection based on pytorch.☆23Sep 15, 2020Updated 5 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- Poisson Pareto Burst Process application for ns-3 discrete-event network simulator.☆20Jan 29, 2023Updated 3 years ago
- 微博评论爬取及nlp情感分析☆21Apr 4, 2018Updated 7 years ago
- A framework for analysis and modeling of IP network flows☆20Sep 25, 2024Updated last year
- ☆59Jul 10, 2024Updated last year
- ☆32Oct 15, 2025Updated 4 months ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆29Sep 23, 2025Updated 5 months ago
- ☆76Aug 31, 2025Updated 6 months ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Jul 29, 2021Updated 4 years ago