ufam-lia / bgp-feature-extractor
Extracts volume and AS-path features of BGP datasets.
☆9Updated 2 years ago
Alternatives and similar repositories for bgp-feature-extractor:
Users that are interested in bgp-feature-extractor are comparing it to the libraries listed below
- ☆15Updated last year
- Mining Network Specifications from Network Configurations☆28Updated 4 years ago
- Pinpointing delay and forwarding anomalies from large-scale traceroute measurements.☆12Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- ☆21Updated last year
- ☆15Updated 3 years ago
- A stable and practical Autonomous System(AS) relationship inference algorithm☆22Updated 2 years ago
- AddrMiner/AddrMiner☆6Updated last year
- SyNET Network-wide Configuration Synthesis☆27Updated 7 years ago
- Implementation of methodology described in ACM SIGCOMM CCR 48(1), pp. 19-27.☆13Updated 6 years ago
- Chaos - BGP and Traffic Simulation for Evaluation of Internet Resiliency Systems☆13Updated 3 years ago
- ☆14Updated last year
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆126Updated last year
- Tool using automatic template inference to find network misconfigurations☆11Updated 4 years ago
- 从pcap获取流的基本信息工具☆205Updated last year
- ☆17Updated 7 months ago
- An automatic packet crafting tool for evading learning-based NIDS☆77Updated 3 years ago
- Implementation of AppScanner☆40Updated 2 years ago
- Tools for CAIDA's scamper packet prober☆29Updated 3 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆33Updated 4 years ago
- Implementation of PLELog in ICSE 2021 accepted paper:Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation.☆73Updated last year
- Reduce false-positive alarms via voxel based point cloud analysis.☆22Updated 8 months ago
- It is a network traffic classifier based on deep learning.☆44Updated 10 months ago
- Simulates attack/defend scenarios in BGP☆34Updated this week
- A toolkit for Light Log Anomaly Detection [ICSE'24]☆17Updated last year
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆50Updated 3 years ago
- Traffic dataset USTC-TFC2016☆121Updated 5 years ago
- 基于IDS 2018数据集使用LightGBM和XGBoost实现DDoS流量分类 sFlow RT&Mininet流量采集与分类 杭电综合项目实践☆25Updated 4 years ago
- Practical Network-Wide Configuration Synthesis with Autocompletion☆37Updated 6 years ago
- A scalable and accurate probabilistic network configuration analyzer verifying network properties in the face of random failures.☆31Updated 3 years ago