Kyanji / MAGNETO
☆19Updated 2 months ago
Alternatives and similar repositories for MAGNETO:
Users that are interested in MAGNETO are comparing it to the libraries listed below
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆16Updated last year
- ☆40Updated 2 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆13Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 4 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆12Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 6 months ago
- ☆10Updated last year
- Generative adversarial networks for Network Intrusion Benchmark datasets☆34Updated 8 months ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 2 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆14Updated 2 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆44Updated 6 months ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆33Updated last year
- ☆13Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆12Updated 2 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆13Updated 3 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 4 years ago
- This is repository of the paper NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging.☆12Updated 6 months ago
- ☆16Updated 4 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Updated 5 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Updated 4 years ago
- An Intrusion Detection System based on Deep Belief Networks☆82Updated 2 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆33Updated 4 years ago
- ☆21Updated 4 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆68Updated 4 years ago
- ☆24Updated last year
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆13Updated 3 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 4 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆14Updated 2 years ago
- ☆10Updated 2 years ago