cdogemaru / CPIPLinks
☆15Updated 2 years ago
Alternatives and similar repositories for CPIP
Users that are interested in CPIP are comparing it to the libraries listed below
Sorting:
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- ☆53Updated 4 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆37Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆94Updated 3 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆13Updated last year
- ☆94Updated 2 years ago
- IDS abnormal traffic detection tensorflow☆44Updated 6 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆50Updated 5 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆75Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 8 months ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆38Updated 5 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Updated 2 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆131Updated 2 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆48Updated 5 years ago
- ☆21Updated 5 years ago
- Implementation of AppScanner☆44Updated 3 years ago
- It is a network traffic classifier based on deep learning.☆49Updated last year
- ☆19Updated 3 years ago
- source code for USENIX Security paper xNIDS☆58Updated last year
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- ☆31Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Updated 5 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆14Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- ☆48Updated 3 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆88Updated 7 years ago
- Traffic dataset USTC-TFC2016☆152Updated 6 years ago
- ☆20Updated 10 months ago