ChrisFugl / Intrusing-Detection-System-Attack
Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is normal traffic.
☆72Updated last year
Alternatives and similar repositories for Intrusing-Detection-System-Attack:
Users that are interested in Intrusing-Detection-System-Attack are comparing it to the libraries listed below
- Tensorflow环境下,基于CNN算法,KD99与网络数据训练集共3000w数据训练,在19w数据与1w攻检验下,模型准确率为92.8%.☆62Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆82Updated 2 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆20Updated 3 years ago
- DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.☆11Updated 3 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆77Updated 3 years ago
- FL-based intrusion detection system development using model averaging.☆36Updated 2 years ago
- [USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malici…☆60Updated 5 months ago
- ☆40Updated 2 years ago
- windows kernel event log collect☆114Updated 2 months ago
- use sklearn to detect two types of network attacks☆30Updated 5 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆11Updated 3 years ago
- ☆16Updated 4 years ago
- ☆19Updated 2 months ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆33Updated 4 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆61Updated 4 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆44Updated 6 months ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆16Updated last year
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆13Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 6 months ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆12Updated last year
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆11Updated last year
- A Behavior-Based Device Identification Method for the IoT☆54Updated last month
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 4 years ago
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆12Updated 6 months ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆39Updated 10 months ago
- ☆19Updated 3 weeks ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆39Updated last year
- ☆78Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆33Updated last year
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆24Updated 4 years ago