CN-TU / ids-backdoor
Contact: Maximilian Bachl, Alexander Hartl. Explores defenses against backdoors and poisoning attacks for Intrusion Detection Systems. Code for "EagerNet" is in the "eager" branch.
☆9Updated 4 years ago
Alternatives and similar repositories for ids-backdoor:
Users that are interested in ids-backdoor are comparing it to the libraries listed below
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆21Updated 4 years ago
- ☆25Updated 3 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆18Updated 4 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆31Updated 4 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆14Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆32Updated 3 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆20Updated 3 years ago
- FL-based intrusion detection system development using model averaging.☆36Updated 2 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆39Updated 10 months ago
- ☆9Updated last year
- An automatic packet crafting tool for evading learning-based NIDS☆77Updated 3 years ago
- ☆16Updated 4 years ago
- ☆21Updated 4 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆13Updated last year
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆38Updated 9 months ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- ☆19Updated 4 years ago
- ☆22Updated 3 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆61Updated 4 years ago
- ☆15Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆25Updated 4 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆12Updated last year
- Adaptive Federated Learning Approach to DDoS attack detection☆45Updated 4 months ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆28Updated 2 years ago
- Official repository of the paper "The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems".☆9Updated 3 years ago
- ☆13Updated 2 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- ☆10Updated 2 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆11Updated 2 years ago