Western-OC2-Lab / AutoML-and-Adversarial-Attack-Defense-for-Zero-Touch-Network-SecurityLinks
This repository includes code for the AutoML-based IDS and adversarial attack defense case studies presented in the paper "Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis" published in IEEE Transactions on Network and Service Management.
☆37Updated 4 months ago
Alternatives and similar repositories for AutoML-and-Adversarial-Attack-Defense-for-Zero-Touch-Network-Security
Users that are interested in AutoML-and-Adversarial-Attack-Defense-for-Zero-Touch-Network-Security are comparing it to the libraries listed below
Sorting:
- This repository includes code for the paper "Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion D…☆29Updated 8 months ago
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆509Updated last year
- Data stream analytics: Implement online learning methods to address concept drift and model drift in dynamic data streams. Code for the p…☆33Updated 2 years ago
- Data stream analytics: Implement online learning methods to address concept drift and model drift in data streams using the River library…☆212Updated 2 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆175Updated 2 years ago
- IoT Attack Detection with machine learning☆27Updated last month
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆84Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆39Updated last year
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 3 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆23Updated 10 months ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆17Updated last year
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆23Updated 4 years ago
- CICIDS2017 dataset☆70Updated 3 years ago
- Correlation Aware DDoS Detection In IoT Systems☆9Updated last year
- ☆20Updated 5 months ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- ☆9Updated 2 years ago
- source code for USENIX Security paper xNIDS☆43Updated 10 months ago
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆45Updated 2 months ago
- An online learning method used to address concept drift and model drift. Code for the paper entitled "A Lightweight Concept Drift Detecti…☆52Updated last year
- ☆28Updated last year
- ☆11Updated 3 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆21Updated 3 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆45Updated 9 months ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆35Updated 11 months ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 3 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆16Updated 2 years ago