CN-TU / ids-backdoor
Contact: Maximilian Bachl, Alexander Hartl. Explores defenses against backdoors and poisoning attacks for Intrusion Detection Systems. Code for "EagerNet" is in the "eager" branch.
☆9Updated 4 years ago
Alternatives and similar repositories for ids-backdoor:
Users that are interested in ids-backdoor are comparing it to the libraries listed below
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆32Updated 3 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆20Updated 4 years ago
- ☆25Updated 3 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆77Updated 3 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆30Updated 4 years ago
- ☆10Updated 2 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆16Updated 3 years ago
- FL-based intrusion detection system development using model averaging.☆37Updated 2 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆11Updated last year
- source code for USENIX Security paper xNIDS☆36Updated 6 months ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago
- ☆17Updated 4 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆19Updated 3 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆38Updated 8 months ago
- ☆11Updated 2 years ago
- ☆9Updated last year
- ☆16Updated 4 years ago
- Adaptive Federated Learning Approach to DDoS attack detection☆44Updated 3 months ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆60Updated 4 years ago
- ☆14Updated 2 years ago
- ☆24Updated last year
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆27Updated 2 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆13Updated last year
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆23Updated 2 months ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆11Updated 2 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆12Updated last year
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆11Updated 2 years ago
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆19Updated 4 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆45Updated last year