CN-TU / ids-backdoor
Contact: Maximilian Bachl, Alexander Hartl. Explores defenses against backdoors and poisoning attacks for Intrusion Detection Systems. Code for "EagerNet" is in the "eager" branch.
☆9Updated 4 years ago
Alternatives and similar repositories for ids-backdoor:
Users that are interested in ids-backdoor are comparing it to the libraries listed below
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆22Updated 4 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆18Updated 4 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆79Updated 3 years ago
- ☆17Updated 4 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆33Updated 3 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆20Updated 3 years ago
- ☆10Updated 2 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆31Updated 4 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆14Updated 2 years ago
- ☆25Updated 3 years ago
- ☆9Updated 2 years ago
- FL-based intrusion detection system development using model averaging.☆36Updated 2 years ago
- ☆19Updated 4 years ago
- Non-official implementation of Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection☆21Updated 2 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago
- Official repository of the paper "The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems".☆9Updated 3 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆38Updated 10 months ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Fl…☆14Updated 11 months ago
- ☆24Updated last year
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆62Updated 4 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆25Updated 4 years ago
- ☆13Updated 2 years ago
- ☆19Updated 2 months ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆11Updated 3 years ago
- ☆21Updated 6 months ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆12Updated 2 months ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆39Updated 11 months ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- LEXNet: A Lightweight, Efficient and Explainable-by-Design Convolutional Neural Network for Internet Traffic Classification☆12Updated last year