harshilpatel1799 / IoT-Network-Intrusion-Detection-and-Classification-using-Explainable-XAI-Machine-LearningView on GitHub
The continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection systems (IDSs). Over the last few years, IDSs for IoT networks have been increasing reliant on machine learning (ML) techniques, algorithms, and models as traditional cybersecurity approaches become less viable fo…
☆60Apr 30, 2021Updated 5 years ago
Alternatives and similar repositories for IoT-Network-Intrusion-Detection-and-Classification-using-Explainable-XAI-Machine-Learning
Users that are interested in IoT-Network-Intrusion-Detection-and-Classification-using-Explainable-XAI-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆81Apr 3, 2021Updated 5 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优 于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 4 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆14Jul 10, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆205Sep 8, 2021Updated 4 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆14Apr 22, 2021Updated 5 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- The project aims to analyse different types of attacks using the Bot-IoT dataset and also apply & compare different classification algori…☆13Oct 19, 2021Updated 4 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆14Dec 23, 2023Updated 2 years ago
- source code for USENIX Security paper xNIDS☆61Aug 27, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆91Sep 19, 2020Updated 5 years ago
- A research project of anomaly detection on dataset IoT-23☆111Feb 22, 2026Updated 2 months ago
- An intelligent classifier based Intrusion Detection System for IoV’s based on Neural Networks like optimized CNN, transfer learning and e…☆19May 19, 2022Updated 4 years ago
- ☆43Dec 26, 2020Updated 5 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆25Dec 24, 2021Updated 4 years ago
- A network intrusion detection system using machine learning. Naive Bayes, Decision Tree machine learning algorithm are used in this proje…☆15Dec 12, 2016Updated 9 years ago
- Ev charging station demand Prediction for integration with microgrid optimization☆21Mar 31, 2020Updated 6 years ago
- Predicting the energy consumption of EVs using the RNN and LSTM. Competencies: Machine Learning, RNN, SUMO Simulation. Python Libraries: …☆20Feb 12, 2021Updated 5 years ago
- Botnet detection on IoT Devices☆29Mar 7, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆207Apr 20, 2026Updated 3 weeks ago
- IoT intrusion Detection Model based on neural network and random forests☆50Oct 16, 2018Updated 7 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆46Jun 3, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- ☆34Dec 18, 2021Updated 4 years ago
- A multi-access (edge) fog computing mobile crowd-sensing simulator. Given a place as input, the current version creates a user movements …☆11Sep 18, 2025Updated 8 months ago
- a classification for N-BaloT which is a Anomaly Detection☆17May 4, 2022Updated 4 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- ☆11May 1, 2021Updated 5 years ago
- Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased …☆52May 21, 2019Updated 6 years ago