☆22Feb 14, 2020Updated 6 years ago
Alternatives and similar repositories for doh_traffic_analysis
Users that are interested in doh_traffic_analysis are comparing it to the libraries listed below
Sorting:
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆19Jun 15, 2020Updated 5 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Dec 15, 2017Updated 8 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆12Mar 5, 2023Updated 2 years ago
- ☆18Jan 12, 2025Updated last year
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- 基于winpcap的数据包解析工具;比tshark更快。☆17Jul 1, 2020Updated 5 years ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- ☆13Jun 26, 2022Updated 3 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- agurim: a multi-dimensional flow aggregation tool☆21Jul 5, 2019Updated 6 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- Implementation of AppScanner☆46Jul 29, 2022Updated 3 years ago
- ☆26Sep 20, 2023Updated 2 years ago
- Original implementation of FlowPrint as in the NDSS '20 paper☆128Feb 8, 2023Updated 3 years ago
- Some of the presentations given by me☆19Aug 8, 2025Updated 6 months ago
- Passive DNS Dataset of Domain Resolutions☆18Jun 14, 2022Updated 3 years ago
- Decrypts and logs a process's SSL traffic.☆26Mar 10, 2021Updated 4 years ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- This repository contains the code for the paper "Website Fingerprinting in the Age of QUIC" (PETS 2021).☆22Jul 12, 2023Updated 2 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆195Mar 25, 2023Updated 2 years ago
- ☆26Mar 8, 2024Updated last year
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- Code and dataset for AppScanner☆32Jul 3, 2017Updated 8 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆30Aug 28, 2022Updated 3 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆29Jan 26, 2025Updated last year
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆163Sep 2, 2025Updated 6 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆72May 15, 2023Updated 2 years ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆80Sep 13, 2023Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- ☆22Aug 29, 2025Updated 6 months ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago