tfukui95 / tor-experimentLinks
☆6Updated 6 years ago
Alternatives and similar repositories for tor-experiment
Users that are interested in tor-experiment are comparing it to the libraries listed below
Sorting:
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- ☆25Updated 3 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆23Updated 4 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Updated 7 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆38Updated 4 months ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆96Updated 10 months ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆36Updated 4 years ago
- ☆33Updated 6 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆25Updated 9 years ago
- ☆18Updated 5 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- Implementation of "Website Fingerprinting at Internet Scale"☆23Updated 2 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆22Updated 4 years ago
- Automatic Feature Generation for Website Fingerprinting☆31Updated 8 years ago
- Contains python tools for performing website fingerprinting classification as well as fetching web-pages.☆13Updated 2 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆52Updated last year
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated last year
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆51Updated 3 years ago
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆41Updated 8 years ago
- ☆22Updated 5 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆43Updated 6 years ago
- ☆17Updated 2 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Updated 3 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆114Updated 3 years ago
- ☆19Updated 3 years ago
- Pcap Converter: convert pcap to text or flows.☆49Updated 5 years ago
- Version of the tor-browser-crawler that we used with Onionpop.☆8Updated 7 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆106Updated last year