Kyanji / MAGNETOLinks
☆20Updated 6 months ago
Alternatives and similar repositories for MAGNETO
Users that are interested in MAGNETO are comparing it to the libraries listed below
Sorting:
- ☆13Updated last year
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 3 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆35Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- ☆10Updated last year
- This platform is designed and implemented for encrypted traffic classification using deep learning☆15Updated last year
- ☆11Updated 3 years ago
- ☆44Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆84Updated 2 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆45Updated 10 months ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- ☆11Updated last year
- ☆19Updated 4 years ago
- ☆9Updated 2 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- A GAN-based model focused on anomaly detection in discrete dataset☆26Updated 5 years ago
- ☆15Updated 2 years ago
- ☆86Updated last year
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 10 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- using 2d-cnn to classify network traffic☆21Updated 5 years ago
- ☆25Updated last year
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆13Updated 3 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆40Updated 3 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆16Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago