BNN-UPC / GNN-NIDSLinks
☆53Updated 4 years ago
Alternatives and similar repositories for GNN-NIDS
Users that are interested in GNN-NIDS are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of of Anomal-E.☆36Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆95Updated 3 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆74Updated 4 years ago
- NEGSC☆43Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Updated last year
- ☆21Updated 2 years ago
- Network System Intrusion Detection using Graph Neural Networks☆20Updated 2 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆118Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆89Updated 3 years ago
- ☆94Updated 2 years ago
- ☆30Updated 2 years ago
- IDS abnormal traffic detection tensorflow☆44Updated 6 years ago
- ☆47Updated 3 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Updated last year
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆111Updated 10 months ago
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆38Updated last year
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Updated 5 years ago
- ☆21Updated 5 years ago
- ☆19Updated last year
- source code for USENIX Security paper xNIDS☆58Updated last year
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆15Updated 9 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆11Updated 2 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆28Updated 3 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆48Updated 5 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- using 2d-cnn to classify network traffic☆21Updated 5 years ago
- Deep learning models for network intrusion detection☆39Updated 2 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆38Updated 5 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆50Updated last year