CN-TU / adversarial-recurrent-idsView external linksLinks
Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intrusion Detection Systems. Also contains code for "SparseIDS: Learning Packet Sampling with Reinforcement Learning" (branch "rl").
☆19Mar 16, 2021Updated 4 years ago
Alternatives and similar repositories for adversarial-recurrent-ids
Users that are interested in adversarial-recurrent-ids are comparing it to the libraries listed below
Sorting:
- Deep Reinforcement One-Shot Learning Framework for Artificially Intelligent Classification Systems☆36Apr 30, 2020Updated 5 years ago
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Feb 15, 2018Updated 8 years ago
- This repository contains the code for the paper "A flow-based IDS using Machine Learning in eBPF", Contact: Maximilian Bachl☆109Aug 11, 2025Updated 6 months ago
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF☆22Apr 9, 2024Updated last year
- ☆16Jan 5, 2018Updated 8 years ago
- Linux kernel: eBPF support for user-defined TCP options☆30May 26, 2020Updated 5 years ago
- 针对iris,sonar数据集的K_means(k均值聚类),FCM(模糊均值聚类)算法,以及minst,yale人脸数据集的SVM与包分类☆11Jan 20, 2021Updated 5 years ago
- A Python wrapper for libhackrf☆12Jul 10, 2023Updated 2 years ago
- An IDS implementation using machine learning☆39Aug 5, 2017Updated 8 years ago
- Network Analysis Using Wireshark 3☆10Jan 30, 2023Updated 3 years ago
- SMOTE-BD: A distributed Synthetic Minority Oversampling Technique (SMOTE) for Big Data.☆10Apr 1, 2019Updated 6 years ago
- ☆30Apr 13, 2023Updated 2 years ago
- Generating P4 Code for the Application Layer☆15Sep 27, 2023Updated 2 years ago
- Speed up development of AF_XDP-based Network Functions☆14Jul 16, 2023Updated 2 years ago
- Datanlord's RDMA nic driver☆12Sep 12, 2024Updated last year
- ☆12Jul 4, 2023Updated 2 years ago
- implementation of the paper "APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Emb…☆12Dec 24, 2024Updated last year
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- ☆11Sep 10, 2021Updated 4 years ago
- ebpf/xdp-based IPSec L2 load-balancer☆13Aug 3, 2023Updated 2 years ago
- Here we try to detect the attack at it's first attempt using machine learning algorithms(Reinforcement l)☆11Apr 27, 2020Updated 5 years ago
- ☆10Apr 20, 2025Updated 9 months ago
- zero-overhead SSH protection at XDP speed. Guard your SSH like tyr guard the gates of asgard!☆11May 2, 2025Updated 9 months ago
- eBPF/XDP Redirect Example☆12Oct 21, 2022Updated 3 years ago
- C Programming☆10Feb 19, 2025Updated 11 months ago
- ☆16Apr 6, 2024Updated last year
- ☆14Aug 6, 2023Updated 2 years ago
- 一个基于LSM树的单机KV存储引擎☆12Aug 15, 2023Updated 2 years ago
- ☆15Jan 7, 2023Updated 3 years ago
- ☆13Mar 17, 2022Updated 3 years ago
- CausIL is an approach to estimate the causal graph for a cloud microservice system, where the nodes are the service-specific metrics whil…☆13Jul 3, 2023Updated 2 years ago
- mobile Driving License Interoperability Learning Platform☆15Sep 6, 2018Updated 7 years ago
- High-Speed Stateful Packet Processor for Programmable Switches☆14Dec 18, 2022Updated 3 years ago
- Lesson plugins for Marimo notebooks☆19Apr 9, 2025Updated 10 months ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- ☆15Jun 6, 2023Updated 2 years ago
- This script is for quantification of retinal vessel tortuosity in fundus/OPTOS images. Several measures of tortuosity is calculated and s…☆12Feb 10, 2021Updated 5 years ago
- SAGE disambiguates protocol description in an IETF RFC document, then converts the disambiguated protocol description into executable pro…☆18Aug 9, 2021Updated 4 years ago
- ☆12Sep 28, 2020Updated 5 years ago