Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to generate a defended dataset to evaluate DF and RF? #2

Open
DUCK-lnbby opened this issue Jan 4, 2025 · 0 comments
Open

How to generate a defended dataset to evaluate DF and RF? #2

DUCK-lnbby opened this issue Jan 4, 2025 · 0 comments

Comments

@DUCK-lnbby
Copy link

My approach is as follows:
Process the CW dataset by labeling each traffic record with a domain name ID and number. Each file contains detailed information about the packets, including timestamps and directions.
After processing with extract-list.py, cluster.py, refinement.py, and regularization.py, generate the defended traffic. At this point, the filenames remain the same as the original undisturbed traffic, and then they are converted back into npz files for DF and RF attacks. However, my RF results consistently show 1.05%, and I am unsure which details need to be corrected. If possible, I would greatly appreciate any guidance.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant