CN-TU / ids-backdoor
Contact: Maximilian Bachl, Alexander Hartl. Explores defenses against backdoors and poisoning attacks for Intrusion Detection Systems. Code for "EagerNet" is in the "eager" branch.
☆9Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for ids-backdoor
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆16Updated 3 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆31Updated 3 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆74Updated 2 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆19Updated 3 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- ☆24Updated 3 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆25Updated 4 years ago
- ☆15Updated last year
- FL-based intrusion detection system development using model averaging.☆31Updated last year
- using 2d-cnn to classify network traffic☆20Updated 4 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆56Updated 4 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆50Updated last year
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆13Updated 3 years ago
- ☆19Updated last year
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆23Updated this week
- ☆14Updated 4 years ago
- source code for USENIX Security paper xNIDS☆34Updated 2 months ago
- Encrypted Traffic classification☆17Updated 4 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 4 years ago
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆19Updated 4 years ago
- Intrusion detection system using CNN and RNN☆22Updated 5 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆32Updated 3 years ago
- The repository of FastTraffic, A lightweight method for encrypted traffic fast classification.☆12Updated 4 months ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆11Updated last year
- Extracting data and analyzing the network traffic flow☆12Updated 6 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆13Updated 3 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆16Updated 3 years ago
- Wang Wei's End-to-end encrypted traffic classification with one-dimensional convolution neural networks (scripts and article))☆29Updated 4 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆42Updated 4 years ago