wszhs / Cyber-Security-ML-Toolbox
Adversarial machine learning and explainable machine learning for cyber security
☆11Updated 2 years ago
Alternatives and similar repositories for Cyber-Security-ML-Toolbox:
Users that are interested in Cyber-Security-ML-Toolbox are comparing it to the libraries listed below
- An automatic packet crafting tool for evading learning-based NIDS☆77Updated 3 years ago
- source code for USENIX Security paper xNIDS☆36Updated 4 months ago
- ☆17Updated 3 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆17Updated 4 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆13Updated 4 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 4 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆16Updated 3 years ago
- ☆22Updated last year
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆19Updated 3 years ago
- ☆25Updated 3 years ago
- Implementation of AppScanner☆40Updated 2 years ago
- ☆19Updated 2 years ago
- ☆15Updated 4 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆37Updated 10 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆31Updated 3 years ago
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆23Updated 4 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆15Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆132Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆12Updated 2 years ago
- CICIDS2017 dataset☆57Updated 3 years ago
- ☆72Updated last year
- ☆16Updated 7 months ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆46Updated last week
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆21Updated 4 years ago
- ☆9Updated 2 years ago
- ☆39Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆31Updated last year
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆9Updated last year
- Encrypted Network Traffic Classification using Deep Learning☆51Updated 9 months ago