ChrisFugl / Intrusing-Detection-System-Attack
Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is normal traffic.
☆74Updated last year
Alternatives and similar repositories for Intrusing-Detection-System-Attack
Users that are interested in Intrusing-Detection-System-Attack are comparing it to the libraries listed below
Sorting:
- Tensorflow环境下,基于CNN算法,KD99与网络数据训练集共3000w数据训练,在19w数据与1w攻检验下,模型准确率为92.8%.☆62Updated 3 years ago
- Practical Detection of Trojan Neural Networks☆119Updated 4 years ago
- [USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malici…☆61Updated 7 months ago
- ☆29Updated 2 months ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆21Updated 3 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 8 months ago
- Secure Transformer Inference is a protocol for serving Transformer-based models securely.☆92Updated last year
- use sklearn to detect two types of network attacks☆33Updated 5 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- IoT Attack Detection with machine learning☆27Updated 10 months ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆35Updated 9 months ago
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆16Updated last month
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆24Updated 4 years ago
- FL-based intrusion detection system development using model averaging.☆37Updated 2 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆13Updated 9 months ago
- PhishIntention: Phishing detection through webpage intention☆249Updated 3 weeks ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆11Updated 3 years ago
- ☆41Updated 2 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆34Updated 4 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆44Updated 7 months ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆22Updated 4 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆34Updated 4 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆47Updated 5 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆46Updated 4 years ago
- ☆21Updated 6 months ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆14Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆83Updated 2 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Updated 3 years ago