AshinWang / ConFlowLinks
Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"
☆13Updated 3 years ago
Alternatives and similar repositories for ConFlow
Users that are interested in ConFlow are comparing it to the libraries listed below
Sorting:
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- ☆45Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆85Updated 2 years ago
- ☆20Updated 7 months ago
- ☆19Updated 4 years ago
- ☆25Updated last year
- ☆13Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆35Updated 2 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated 2 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆18Updated last year
- This platform is designed and implemented for encrypted traffic classification using deep learning☆15Updated last year
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆14Updated 3 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago
- ☆11Updated 3 years ago
- ☆49Updated 3 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- ☆87Updated last year
- Application of novel EC-GAN method on Network Intrusion Detection☆22Updated 3 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Updated 2 years ago
- code implementation for paper: A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification☆52Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆47Updated 5 years ago
- ☆12Updated 3 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆114Updated 2 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆58Updated 7 months ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- source code for USENIX Security paper xNIDS☆46Updated last year
- ☆18Updated last year
- ☆10Updated last year