AbertayMachineLearningGroup / zero-day-detectionLinks
☆16Updated 2 years ago
Alternatives and similar repositories for zero-day-detection
Users that are interested in zero-day-detection are comparing it to the libraries listed below
Sorting:
- A Federated Learning based Android Malware Classification System☆27Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆20Updated last year
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆27Updated 10 months ago
- ☆10Updated 2 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Updated 2 years ago
- ☆10Updated 2 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- Application of novel EC-GAN method on Network Intrusion Detection☆24Updated 4 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆56Updated 3 months ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 10 months ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- ☆13Updated last year
- ☆14Updated 4 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Updated 3 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆48Updated last year
- ☆31Updated 2 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆18Updated 3 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆27Updated last year
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Updated last year
- ☆11Updated 4 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Updated 7 months ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Updated 4 years ago
- ☆20Updated last year
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- Machine Learning in Cybersecurity☆90Updated 8 months ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Updated 5 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Updated 2 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆235Updated 3 years ago