Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
☆120Jan 10, 2024Updated 2 years ago
Alternatives and similar repositories for MStream
Users that are interested in MStream are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MemStream: Memory-Based Streaming Anomaly Detection☆92Jan 10, 2024Updated 2 years ago
- Sketch-Based Anomaly Detection in Streaming Graphs☆87Aug 20, 2024Updated last year
- Anomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), fraud…☆778Jan 10, 2024Updated 2 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- Adversarial Generation of Extreme Samples☆79Jan 10, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python implementation of MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams☆38Jun 22, 2022Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- SedanSpot: Detecting Anomalies in Edge Streams☆25Sep 11, 2018Updated 7 years ago
- P4DDLe: Introducing Packet-Level Analysis in Programmable Data Planes to Advance Network Intrusion Detection☆21Oct 7, 2024Updated last year
- PyTorch implementation of "A Simple Baseline for Low-Budget Active Learning".☆14Dec 22, 2021Updated 4 years ago
- Deep Reinforcement One-Shot Learning Framework for Artificially Intelligent Classification Systems☆36Apr 30, 2020Updated 5 years ago
- DenseAlert: Incremental Dense-SubTensor Detection in Tensor Streams (KDD'17)☆19Oct 30, 2024Updated last year
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆29Feb 23, 2026Updated last month
- A PyTorch implementation of of E-GraphSAGE.☆107Jun 30, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LSH Scheme based on Longest Circular Co-Substring (SIGMOD 2020)☆14Jul 8, 2021Updated 4 years ago
- UnsupervisedPapers.com is an open-source directory of papers on unsupervised machine learning and related topics with links to resources …☆10Dec 26, 2020Updated 5 years ago
- ☆13May 3, 2021Updated 4 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆27Sep 10, 2024Updated last year
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆296Dec 22, 2023Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- Anomaly Detection in Dynamic Graphs☆32Nov 1, 2023Updated 2 years ago
- Rust implementation (and Python bindings) of https://github.com/bhatiasiddharth/MIDAS☆19Nov 16, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Mirror github releases with an Amazon S3 bucket 🔄☆13Jan 19, 2023Updated 3 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆19Mar 16, 2021Updated 5 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- Code for ICML2020 paper: ''Graph-based Nearest Neighbor Search: From Practice to Theory''☆19Nov 12, 2020Updated 5 years ago
- IDS abnormal traffic detection tensorflow☆44Jul 25, 2019Updated 6 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆36Mar 3, 2023Updated 3 years ago
- The source code for BUTTERFLY COUNTING IN BIPARTITE NETWORKS☆12May 29, 2019Updated 6 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆39Aug 8, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Code to study the generalisability of benchmark models on non-stationary EHRs.☆15Aug 7, 2019Updated 6 years ago
- Euclid: A Fully In-Network, P4-based Approach for Real-Time DDoS Attack Detection and Mitigation☆13Nov 22, 2021Updated 4 years ago
- Code to accompany "Weightless Neural Networks for Efficient Edge Inference", PACT 2022☆22Nov 15, 2022Updated 3 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- Unsupervised Online Video Object Segmentation with Motion Property Understanding☆23Sep 4, 2019Updated 6 years ago
- This repository contains the code for data investigation, and the link to the multi-source distributed system dataset. This repository is…☆24Nov 17, 2020Updated 5 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago