S-Mohammad-Hashemi / RePO
Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems
☆17Updated 4 years ago
Alternatives and similar repositories for RePO:
Users that are interested in RePO are comparing it to the libraries listed below
- An intrusion detection system model developed using CNN and Bi-LSTM.☆12Updated 2 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 4 years ago
- ☆11Updated 3 years ago
- ☆15Updated 4 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆38Updated 6 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆31Updated 3 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆31Updated 6 months ago
- ☆37Updated 2 years ago
- ☆17Updated 4 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆42Updated 7 months ago
- CICIDS2017 dataset☆60Updated 3 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆53Updated 4 years ago
- An Intrusion Detection System based on Deep Belief Networks☆77Updated 2 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆39Updated 5 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆29Updated 4 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆19Updated 3 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆23Updated 4 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆13Updated 4 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆31Updated last year
- An automatic packet crafting tool for evading learning-based NIDS☆77Updated 3 years ago
- Deep learning models for network intrusion detection☆33Updated last year
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆44Updated last year
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆14Updated 2 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆12Updated last year
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆12Updated 3 years ago
- ☆22Updated 5 years ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆24Updated 4 years ago
- Attention Model for Network Intrusion Detection☆17Updated 5 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆18Updated 3 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆21Updated 4 months ago