abhi-jith23 / Intrusion-Detection-System-using-DLView external linksLinks
An intrusion detection system model developed using CNN and Bi-LSTM.
☆13Jun 25, 2022Updated 3 years ago
Alternatives and similar repositories for Intrusion-Detection-System-using-DL
Users that are interested in Intrusion-Detection-System-using-DL are comparing it to the libraries listed below
Sorting:
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- 使用安卓Opcode字节码的N-gram序列特征进行恶意软件检测的完全步骤,使用算法RF,KNN☆18Aug 22, 2020Updated 5 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- ☆20Jul 10, 2024Updated last year
- ☆48Aug 7, 2022Updated 3 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- ☆22Jan 4, 2021Updated 5 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆88Dec 27, 2023Updated 2 years ago
- ☆23May 15, 2019Updated 6 years ago
- Intrusion detection system using CNN and RNN☆25Sep 23, 2019Updated 6 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆198Apr 21, 2023Updated 2 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆35Mar 3, 2023Updated 2 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆43Aug 10, 2021Updated 4 years ago
- ☆14Apr 1, 2025Updated 10 months ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆14Oct 17, 2024Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- ☆11Dec 29, 2020Updated 5 years ago
- Code accompanying our ICML 2020 paper on choice set optimization in group decision-making.☆11Jun 27, 2020Updated 5 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆19Sep 9, 2025Updated 5 months ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated last year
- ☆10May 26, 2024Updated last year
- ☆13Sep 23, 2024Updated last year
- [CIKM 2022] Towards Automated Over-Sampling for Imbalanced Classification☆10Mar 20, 2023Updated 2 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- HSTGODE code☆10Nov 26, 2023Updated 2 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago