BNN-UPC / GNN-NIDSLinks
☆47Updated 3 years ago
Alternatives and similar repositories for GNN-NIDS
Users that are interested in GNN-NIDS are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆88Updated 3 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆69Updated 3 years ago
- NEGSC☆37Updated last year
- ☆19Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆14Updated last year
- ☆17Updated last year
- Encrypted Network Traffic Classification using Deep Learning☆52Updated last year
- IDS abnormal traffic detection tensorflow☆40Updated 6 years ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆95Updated 6 months ago
- ☆19Updated 4 years ago
- ☆86Updated last year
- ☆25Updated last year
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆113Updated 2 years ago
- ☆44Updated 2 years ago
- ☆12Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆84Updated 2 years ago
- Network System Intrusion Detection using Graph Neural Networks☆17Updated 2 years ago
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆35Updated last year
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆26Updated 3 years ago
- ramyaelineni5 / ML-based-Network-Intrusion-Detection-using-Cyber-Dataset-CSE-CIC-IDS2018-to-classify-network-attacks☆43Updated 4 years ago
- ☆22Updated 3 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆43Updated last year
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆47Updated 4 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆10Updated 2 years ago
- ☆9Updated 2 years ago