zsz147 / MineHunterLinks
☆10Updated 3 years ago
Alternatives and similar repositories for MineHunter
Users that are interested in MineHunter are comparing it to the libraries listed below
Sorting:
- The data for paper of `Mobile-app Identification over Drifted Encrypted Network Traffic with Zero-relabeling`.☆10Updated 2 years ago
- A tunneled flooding traffic detection system.☆27Updated 10 months ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆21Updated last year
- Metis: Understanding and Enhancing Regular Expressions in Network☆13Updated 3 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆19Updated 5 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 4 years ago
- ☆27Updated 4 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆23Updated last year
- ☆10Updated 5 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Updated 4 years ago
- ☆11Updated 3 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- Code and dataset for AppScanner☆29Updated 8 years ago
- Insider threat detection via bert☆21Updated 3 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆131Updated last year
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆26Updated 8 months ago
- ☆13Updated 4 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆16Updated 4 months ago
- 将大容量PCAP按流切分成小PCAP☆23Updated 2 years ago
- ☆17Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆21Updated 5 months ago
- ☆20Updated 4 years ago
- ☆22Updated 3 years ago
- ☆52Updated 2 years ago
- Packet Representation Learning for Traffic Classification☆29Updated 9 months ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆107Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆42Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆72Updated 6 months ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago