SyedWaliAbbas / UM-NIDS-ToolView external linksLinks
The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive flow, payload, and contextual features from raw PCAP files, ensuring consistency across datasets and enhancing machine learning-driven threat detection and analysis.
☆14Jan 22, 2025Updated last year
Alternatives and similar repositories for UM-NIDS-Tool
Users that are interested in UM-NIDS-Tool are comparing it to the libraries listed below
Sorting:
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆27Apr 4, 2025Updated 10 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆48Jul 12, 2024Updated last year
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- A Graph Neural Network-based Intrusion Detection System☆31Aug 12, 2024Updated last year
- [CAC2023] Bilateral Network with Residual U-blocks and Dual-Guided Attention for Real-time Semantic Segmentation☆11Nov 28, 2024Updated last year
- ☆58Dec 8, 2022Updated 3 years ago
- ☆24Aug 7, 2023Updated 2 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆33Dec 6, 2024Updated last year
- heiFIP: A tool to convert network traffic into images for ML use cases☆29Jun 12, 2025Updated 8 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated last year
- Implementation of a multi-task model for encrypted network traffic classification based on transformer and 1D-CNN.☆39Dec 24, 2023Updated 2 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆42Apr 17, 2025Updated 10 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆35Mar 3, 2023Updated 2 years ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆10Aug 7, 2023Updated 2 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- ☆18Jul 17, 2025Updated 6 months ago
- ☆14Apr 1, 2025Updated 10 months ago
- This is a MATLAB-SIMULINK-based model to study the effects of partial shading on PV array characteristics.☆11May 27, 2020Updated 5 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆19Sep 9, 2025Updated 5 months ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆12Aug 14, 2025Updated 6 months ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- HSTGODE code☆10Nov 26, 2023Updated 2 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- ☆15May 15, 2025Updated 9 months ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated last year
- ☆10May 26, 2024Updated last year
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- ☆10Nov 13, 2025Updated 3 months ago
- ☆14Feb 26, 2025Updated 11 months ago
- ☆10Mar 11, 2023Updated 2 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- Another Wheel to parse json☆11Mar 13, 2020Updated 5 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago