PoCInnovation / SharkticonLinks
Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.
☆23Updated 2 years ago
Alternatives and similar repositories for Sharkticon
Users that are interested in Sharkticon are comparing it to the libraries listed below
Sorting:
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 8 months ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated last year
- manojkumar-github / Intrusion-Detection-System-for-IoT-networks-using-Gated-Recurrent-Neural-Networks-GRUAn Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Updated 6 years ago
- Anomaly Detection using PCA and BiGAN☆13Updated 4 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆47Updated 5 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆9Updated 2 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆35Updated 10 months ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 5 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆46Updated 11 months ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆43Updated 6 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 6 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- Based on the CICIDS2017 dataset and Pytorch platform☆28Updated 6 years ago
- ☆18Updated 4 years ago
- CICIDS2017 dataset☆69Updated 3 years ago
- Attention Model for Network Intrusion Detection☆17Updated 5 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆14Updated 4 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆44Updated 8 months ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆13Updated 3 months ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Updated 3 years ago
- Deep learning models for network intrusion detection☆36Updated 2 years ago
- ramyaelineni5 / ML-based-Network-Intrusion-Detection-using-Cyber-Dataset-CSE-CIC-IDS2018-to-classify-network-attacks☆42Updated 4 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆70Updated 4 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆38Updated 10 months ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆85Updated 4 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆13Updated 2 years ago
- Official repository of the paper "The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems".☆9Updated 3 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆26Updated 3 years ago
- Synthesis of Adversarial DDos Attacks Using Tabular Generative Adversarial Networks☆10Updated 2 years ago