AbertayMachineLearningGroup / zero-day-detectionLinks
☆15Updated last year
Alternatives and similar repositories for zero-day-detection
Users that are interested in zero-day-detection are comparing it to the libraries listed below
Sorting:
- A Federated Learning based Android Malware Classification System☆27Updated last year
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Updated last year
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆25Updated 8 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆145Updated 2 years ago
- ☆10Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆47Updated last year
- Application of novel EC-GAN method on Network Intrusion Detection☆24Updated 4 years ago
- ☆31Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 8 months ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆21Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆26Updated last year
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆18Updated 2 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆40Updated last year
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆24Updated 8 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- Network Traffic Classification with Graph Neural Networks☆11Updated 2 years ago
- FL-based intrusion detection system development using model averaging.☆40Updated 3 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated 3 years ago
- source code for USENIX Security paper xNIDS☆59Updated last year
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Updated last year
- ☆11Updated 4 years ago
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Updated 6 months ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆26Updated 5 years ago
- ☆21Updated 5 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Updated last year
- ☆94Updated 2 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆12Updated 3 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Updated last year
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Updated last year
- Detection of network traffic anomalies using unsupervised machine learning☆27Updated 3 years ago