Kyanji / MAGNETO
☆19Updated last year
Related projects ⓘ
Alternatives and complementary repositories for MAGNETO
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆15Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆42Updated 4 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆14Updated 2 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆40Updated 2 months ago
- ☆11Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆20Updated 2 months ago
- ☆35Updated 2 years ago
- ☆10Updated 2 years ago
- ☆20Updated 4 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆53Updated 4 years ago
- ☆10Updated 10 months ago
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆12Updated 3 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆29Updated 3 months ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆10Updated 2 years ago
- ☆14Updated 4 years ago
- An Intrusion Detection System based on Deep Belief Networks☆73Updated 2 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆12Updated 3 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆27Updated last year
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆10Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆12Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆66Updated 4 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆30Updated 4 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆13Updated 4 years ago
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆9Updated last year
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆50Updated last year
- Anomaly Detection using PCA and BiGAN☆12Updated 4 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Updated 4 years ago
- using 2d-cnn to classify network traffic☆20Updated 4 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆17Updated 4 years ago