Tanmengxuan / ANIDView external linksLinks
Attention Model for Network Intrusion Detection
☆19Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for ANID
Users that are interested in ANID are comparing it to the libraries listed below
Sorting:
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆35Mar 3, 2023Updated 2 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆145Oct 12, 2021Updated 4 years ago
- ☆15Mar 24, 2023Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- A Graph Neural Network-based Intrusion Detection System☆31Aug 12, 2024Updated last year
- ☆21Jan 27, 2025Updated last year
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆27Sep 10, 2024Updated last year
- ☆53Nov 11, 2021Updated 4 years ago
- IoT intrusion Detection Model based on neural network and random forests☆48Oct 16, 2018Updated 7 years ago
- ☆23May 15, 2019Updated 6 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆172Dec 15, 2019Updated 6 years ago
- A Deep Learning approach toward creating a NIDS using python☆25Aug 8, 2023Updated 2 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆28Jan 6, 2020Updated 6 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆80May 25, 2023Updated 2 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- ☆11Jan 18, 2025Updated last year
- SDN Firewall IDP project☆13May 31, 2024Updated last year
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆41Dec 16, 2022Updated 3 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- Source code for 'Beginning RPG Maker MV' by Darrin Perez☆12Mar 28, 2017Updated 8 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- ☆14Apr 1, 2025Updated 10 months ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆14Oct 17, 2024Updated last year
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆76Apr 3, 2021Updated 4 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- Final Year project based upon Network Intrusion Detection System☆37Jul 10, 2019Updated 6 years ago
- Enhanced Credit Card Fraud Detection based on Attention mechanism and LSTM deep Model☆44Jun 23, 2022Updated 3 years ago
- ☆48Aug 7, 2022Updated 3 years ago