cx0113 / fine-grained-unknown-attack-detectionLinks
☆18Updated 4 years ago
Alternatives and similar repositories for fine-grained-unknown-attack-detection
Users that are interested in fine-grained-unknown-attack-detection are comparing it to the libraries listed below
Sorting:
- ☆24Updated last year
- ☆12Updated last year
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆40Updated last year
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆56Updated 4 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆34Updated 4 years ago
- ☆25Updated 11 months ago
- Implementation of AppScanner☆41Updated 2 years ago
- ☆9Updated 2 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- ☆22Updated 3 years ago
- code implementation for paper: A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification☆47Updated 2 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆13Updated last year
- ☆41Updated 2 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆23Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆35Updated 2 years ago
- Encrypted Network Traffic Classification using Deep Learning☆51Updated last year
- It is a network traffic classifier based on deep learning.☆46Updated last year
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆15Updated 4 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 3 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆13Updated 3 months ago
- ☆15Updated last year
- ☆14Updated 2 years ago
- ☆54Updated 4 months ago
- source code for USENIX Security paper xNIDS☆41Updated 9 months ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 8 months ago
- ☆10Updated last year
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆19Updated 4 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆37Updated 3 years ago
- ☆55Updated 5 months ago
- IDS abnormal traffic detection tensorflow☆39Updated 5 years ago