George730 / E-ResGATLinks
The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.
☆72Updated 4 years ago
Alternatives and similar repositories for E-ResGAT
Users that are interested in E-ResGAT are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of of E-GraphSAGE.☆92Updated 3 years ago
- ☆50Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆35Updated 2 years ago
- NEGSC☆41Updated last year
- ☆20Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Updated last year
- ☆18Updated last year
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆47Updated 2 years ago
- ☆13Updated 4 years ago
- Network System Intrusion Detection using Graph Neural Networks☆20Updated 2 years ago
- ☆26Updated last year
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆101Updated 9 months ago
- ☆58Updated last year
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆114Updated 2 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆16Updated 2 years ago
- ☆11Updated last year
- code repository for the the paper "Encrypted Network Traffic Classification with Higher Order Graph Neural Network"☆37Updated last year
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- Encrypted Network Traffic Classification using Deep Learning☆56Updated last year
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆14Updated 3 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆47Updated 5 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆19Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆18Updated last year
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆73Updated 3 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆117Updated 11 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆74Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Updated last year