AshinWang / ConFlow
Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"
☆14Updated 2 years ago
Alternatives and similar repositories for ConFlow:
Users that are interested in ConFlow are comparing it to the libraries listed below
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆16Updated last year
- ☆37Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆12Updated 2 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆12Updated last year
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 4 years ago
- ☆19Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆29Updated last year
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆35Updated 3 years ago
- 基于动态图神经网络的异常流量检测方法☆39Updated last year
- ☆22Updated last year
- NEGSC☆32Updated 7 months ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆44Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆43Updated 4 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆53Updated 4 years ago
- The dataset that has been processed and the code used to process it☆16Updated 2 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆22Updated 2 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆43Updated 3 months ago
- IDS abnormal traffic detection tensorflow☆38Updated 5 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆44Updated 4 years ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆31Updated 2 years ago
- ☆12Updated 2 years ago
- ☆15Updated 6 months ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆37Updated 10 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆31Updated last year
- ☆15Updated 4 years ago
- code implementation for paper: A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification☆41Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆77Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆68Updated 4 years ago
- using 2d-cnn to classify network traffic☆20Updated 4 years ago