CN-TU / ids-backdoorLinks
Contact: Maximilian Bachl, Alexander Hartl. Explores defenses against backdoors and poisoning attacks for Intrusion Detection Systems. Code for "EagerNet" is in the "eager" branch.
☆10Updated 4 years ago
Alternatives and similar repositories for ids-backdoor
Users that are interested in ids-backdoor are comparing it to the libraries listed below
Sorting:
- A project from EECS6414M of Winter 2020 at York University☆11Updated 5 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆42Updated last year
- Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference…☆125Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- ☆27Updated 4 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆23Updated 4 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆83Updated 3 years ago
- FL-based intrusion detection system development using model averaging.☆40Updated 2 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆47Updated 2 years ago
- ☆14Updated 2 years ago
- ☆19Updated 4 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆22Updated 4 years ago
- ☆14Updated last year
- Non-official implementation of Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection☆23Updated 3 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆35Updated 5 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆141Updated 2 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 3 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆47Updated 5 years ago
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆17Updated 2 years ago
- ACDWM (Adaptive Chunk-based Dynamic Weighted Majority)☆10Updated 5 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆30Updated 2 years ago
- Encrypted Traffic classification☆17Updated 5 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆19Updated last year
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 5 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆19Updated 4 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ☆20Updated 4 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- ☆21Updated 5 years ago