• Home
  • Attack
  • Detect
  • Predict
  • Dataset
  • Contact Us
        • T1-24–01–S–N–CL
        • T2-24–01–S–N–CL
        • T3-24–01–S–N–CL
        • T4-24–01–S–E–M
        • T5-24–01–S–E–LM
        • T6-24–01–S–E–FH
        • T7-24–01–M–NE–CLM
        • T8-24–01–M–NE–CFHL
        • T9-24–01–M–NE–CLM
        • T1-24–02–S–N–CIKM
        • T2-24–02–S–N–CL
        • T3-24–02–S–N–CL
        • T4-24-02-S-E-M
        • T5-24-02-S-E-DL
        • T6-24-02-S-E-DEGN
        • T7-24-02-M-NE-CDEGLN
        • T8-24-02-M-NE-CDL
        • T9-24-02-M-NE-CLH
        • T1-25–01–S–N–CD
        • T2-25–01–S–N–CL
        • T3-25–01–S–N–CD
        • T4-25-01-S-E-FH
        • T5-25-01-S-E-CL
        • T6-25-01-S-E-CL
        • T7-25-01-M-NE-CDN
        • T8-25-01-M-NE-CLFH
        • T9-25-01-M-NE-CDFH
      • Model Description
      • Explainable AI
  • AI-Powered Malicious Network Detection
  • T9 provides an AI-driven detection framework designed to identify malicious network activities across diverse environments.

    By combining multi-source cybersecurity datasets, advanced AI models, and explainable techniques, the Detect module ensures a reliable and transparent approach to modern network security.

  • What Detect Covers
  • T9 provides an AI-driven detection framework designed to identify malicious network activities across diverse environments.

    • End-to-end malicious traffic detection
    • Integration of threat intelligence and real network logs
    • AI-based modeling and data augmentation
    • Explainable detection and trustworthy analysis
    • Foundation for Predict (real-world inference) and XAI modules


  • Core Features
    • AI-Based Detection Model
    • Learns patterns of attacks and abnormal behavior across protocols and payload.
    • XAI-Enhanced Transparency
    • Provides interpretable explanations for every detection.
    • Quality Assurance Pipeline
    • Collects and validates high-quality training data for continuous improvement.
    • Robust and Reliable AI
    • Strengthened against adversarial and evasive attacks.


  • Figure Overview of the T9 Detect pipeline, illustrating data pre-processing, model training and validation, and XAI-based post-processing for transparent malicious traffic detection.
  • Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.