BNN-UPC / GNN-NIDSView external linksLinks
☆53Nov 11, 2021Updated 4 years ago
Alternatives and similar repositories for GNN-NIDS
Users that are interested in GNN-NIDS are comparing it to the libraries listed below
Sorting:
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago
- A PyTorch implementation of of E-GraphSAGE.☆102Jun 30, 2022Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆41Dec 16, 2022Updated 3 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- ☆24Aug 7, 2023Updated 2 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 4 months ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- source code for USENIX Security paper xNIDS☆58Aug 27, 2024Updated last year
- ☆31Oct 14, 2023Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- ☆20Jul 10, 2024Updated last year
- Network Intrusion Detection using GNN☆27Feb 13, 2025Updated last year
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- A Graph Neural Network-based Intrusion Detection System☆30Aug 12, 2024Updated last year
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15May 17, 2022Updated 3 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- NEGSC☆47May 30, 2024Updated last year
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆24Sep 22, 2020Updated 5 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆198Apr 21, 2023Updated 2 years ago
- ☆14Jul 22, 2024Updated last year
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated last year
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆11Nov 29, 2024Updated last year
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆51Dec 3, 2024Updated last year
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆562Aug 6, 2025Updated 6 months ago
- ☆10Jan 4, 2024Updated 2 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Dec 5, 2020Updated 5 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆121Jan 10, 2024Updated 2 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- [ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection☆174Mar 24, 2023Updated 2 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆19Jan 7, 2026Updated last month