George730 / E-ResGATLinks
The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.
☆72Updated 3 years ago
Alternatives and similar repositories for E-ResGAT
Users that are interested in E-ResGAT are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of of E-GraphSAGE.☆90Updated 3 years ago
- ☆49Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆35Updated 2 years ago
- NEGSC☆38Updated last year
- ☆20Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆14Updated last year
- ☆18Updated last year
- ☆13Updated 4 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated 2 years ago
- Network System Intrusion Detection using Graph Neural Networks☆20Updated 2 years ago
- Encrypted Network Traffic Classification using Deep Learning☆55Updated last year
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆37Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- ☆26Updated last year
- ☆22Updated 3 years ago
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆100Updated 8 months ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆20Updated 4 months ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆16Updated 2 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆114Updated 2 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 3 years ago
- ☆57Updated last year
- ☆19Updated 4 years ago
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆13Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆27Updated 4 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆80Updated last year
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆18Updated last year
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆70Updated 3 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆74Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year