Network Intrusion Detection using GNN
☆27Feb 13, 2025Updated last year
Alternatives and similar repositories for Network-Intrusion-Detection
Users that are interested in Network-Intrusion-Detection are comparing it to the libraries listed below
Sorting:
- A Graph Neural Network-based Intrusion Detection System☆32Aug 12, 2024Updated last year
- ☆10Mar 7, 2023Updated 2 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆27Feb 23, 2026Updated last week
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆25Nov 16, 2023Updated 2 years ago
- NEGSC☆47May 30, 2024Updated last year
- ☆20Jul 10, 2024Updated last year
- ☆53Nov 11, 2021Updated 4 years ago
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- Network Traffic Identification with Convolutional Neural Networks☆27Jan 23, 2019Updated 7 years ago
- ☆31Oct 14, 2023Updated 2 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Implementation of a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN.☆39Dec 24, 2023Updated 2 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆60Dec 7, 2025Updated 2 months ago
- ☆14Apr 1, 2025Updated 11 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆49Jul 12, 2024Updated last year
- Machine Learning in Cybersecurity☆91May 23, 2025Updated 9 months ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- 小米路由器3(三)刷老毛子固件☆13Mar 11, 2020Updated 5 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- ☆11Dec 16, 2021Updated 4 years ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- HSTGODE code☆10Nov 26, 2023Updated 2 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated last year
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆20Sep 9, 2025Updated 5 months ago
- Secure and Scalable Federated Learning using Serverless Computing☆12Jan 31, 2024Updated 2 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 2 years ago
- ☆10May 26, 2024Updated last year