wszhs / Cyber-Security-ML-Toolbox
Adversarial machine learning and explainable machine learning for cyber security
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cyber-Security-ML-Toolbox
- ☆16Updated 3 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆74Updated 2 years ago
- source code for USENIX Security paper xNIDS☆34Updated 2 months ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆16Updated 3 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆31Updated 3 years ago
- ☆8Updated 2 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆16Updated 3 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆17Updated 4 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆28Updated last year
- ☆65Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆13Updated 3 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆19Updated 3 years ago
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆9Updated last year
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆13Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆129Updated last year
- ☆35Updated last year
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆55Updated last year
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆20Updated 2 months ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆21Updated 4 years ago
- ☆24Updated 3 years ago
- ☆17Updated 2 years ago
- ☆15Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆28Updated 4 months ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆29Updated 3 months ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆36Updated 8 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- ☆19Updated last year
- ☆14Updated 3 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆37Updated 5 months ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆12Updated 2 years ago