GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets
☆27Feb 23, 2026Updated 2 weeks ago
Alternatives and similar repositories for GNN4ID
Users that are interested in GNN4ID are comparing it to the libraries listed below
Sorting:
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆15Jan 22, 2025Updated last year
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆49Jul 12, 2024Updated last year
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆25Apr 1, 2025Updated 11 months ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 6 months ago
- ☆14Feb 26, 2025Updated last year
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- This repository includes code for the paper "Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion D…☆34Nov 8, 2024Updated last year
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- source code for USENIX Security paper xNIDS☆58Aug 27, 2024Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆36Mar 3, 2023Updated 3 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆25Nov 16, 2023Updated 2 years ago
- NEGSC☆47May 30, 2024Updated last year
- Network Intrusion Detection using GNN☆27Feb 13, 2025Updated last year
- LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection (arXiv:2311.08000v2)☆24Nov 22, 2025Updated 3 months ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆52Mar 2, 2024Updated 2 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- Word2Vec embeddings over packet capture data n-grams.☆20Mar 24, 2023Updated 2 years ago
- ☆58Dec 8, 2022Updated 3 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆28Sep 10, 2024Updated last year
- Netgpt: Generative pretrained transformer for network traffic☆32Jan 10, 2025Updated last year
- ☆90Dec 14, 2024Updated last year
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆32Dec 20, 2024Updated last year
- ☆31Oct 14, 2023Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- TabKANet, Use Kolmogorov Arnold network and Transformer to unify tabular data modeling.☆36Feb 17, 2026Updated 3 weeks ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- Hybrid approach combining LSTM and Graph Convolutional Networks (GCN) for real-time anomaly detection in dynamic computer network data.☆11Jun 14, 2025Updated 8 months ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆61Dec 7, 2025Updated 3 months ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated 11 months ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated 11 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆12Jun 19, 2024Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 7 months ago