Kyanji / MAGNETO
☆19Updated 2 months ago
Alternatives and similar repositories for MAGNETO:
Users that are interested in MAGNETO are comparing it to the libraries listed below
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆16Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 7 months ago
- ☆41Updated 2 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 2 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆13Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆33Updated 2 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆13Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆44Updated 7 months ago
- ☆12Updated 2 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆47Updated 4 years ago
- ☆10Updated last year
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆13Updated 4 years ago
- ☆10Updated 2 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆35Updated 8 months ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Updated 4 years ago
- ☆17Updated 4 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- ☆24Updated last year
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆11Updated last year
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆44Updated 2 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆13Updated 3 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆29Updated last week
- ☆11Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆12Updated 2 years ago
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆14Updated last month
- ☆19Updated 3 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- The dataset that has been processed and the code used to process it☆16Updated 2 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago