IDS-GAN: Generative Adversarial Networks for AttackGeneration against Intrusion Detection
☆28Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for IDSGAN
Users that are interested in IDSGAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆51Sep 20, 2024Updated last year
- GAN / AUTOENCODER for network intrusion detection using NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd☆19Apr 25, 2023Updated 2 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆81May 25, 2023Updated 2 years ago
- TensorFlow 2 implementation of Wasserstein Conditional GAN with Gradient Penalty (WCGAN-GP) for synthetic data generation☆21Jan 31, 2022Updated 4 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- DuBE: Duple-balanced Ensemble Learning from Skewed Data☆10Oct 31, 2022Updated 3 years ago
- ☆16Jul 15, 2022Updated 3 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- ☆18Apr 26, 2022Updated 3 years ago
- "CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detection" Code, move from github.com/leyiweb/CAN_…☆20Oct 2, 2025Updated 5 months ago
- 🕵️♂️ ML project to identify malicious web payloads, aimed at boosting the effectiveness of WAFs and IDSs.☆15Apr 7, 2024Updated last year
- Implementing from scratch a search engine for the French Wikipedia☆10Feb 22, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AI-IDS software for Splunk☆21Apr 8, 2020Updated 5 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- ☆43Dec 26, 2020Updated 5 years ago
- ☆16Oct 18, 2023Updated 2 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- Official code for Fisher information embedding for node and graph learning (ICML 2023)☆19Jun 17, 2023Updated 2 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆89Dec 27, 2023Updated 2 years ago
- uPU, nnPU and PN learning with Extra Trees classifier.☆19Dec 2, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Another Wheel to parse json☆11Mar 13, 2020Updated 6 years ago
- Imitation Adversarial Attacks for Black-box Neural Ranking Models☆12Feb 5, 2024Updated 2 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆11Aug 7, 2023Updated 2 years ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆80Jul 16, 2021Updated 4 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Use Introduction☆21Aug 4, 2019Updated 6 years ago
- EL-CodeBert: Better Exploiting CodeBert to Support Source Code-Related Classification Tasks☆14Feb 17, 2022Updated 4 years ago
- code space of paper "Safety Layers in Aligned Large Language Models: The Key to LLM Security" (ICLR 2025)☆22Apr 26, 2025Updated 11 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This repository contains an implementation of an anomaly detection method called DPLAN, which is based on the reinforcement learning fram…☆12Jan 8, 2024Updated 2 years ago
- ☆18Nov 26, 2024Updated last year
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆13Dec 23, 2023Updated 2 years ago
- ☆23Feb 24, 2023Updated 3 years ago
- Code, data, and models for the EMNLP 2020 paper "Learning to Fuse Sentences with Transformers for Summarization"☆16Nov 2, 2022Updated 3 years ago
- LSTM and MLP for sql injection detection☆26Dec 9, 2018Updated 7 years ago
- ☆14Feb 26, 2025Updated last year