liamdm / FlowTransformerLinks
☆99Updated 2 years ago
Alternatives and similar repositories for FlowTransformer
Users that are interested in FlowTransformer are comparing it to the libraries listed below
Sorting:
- ☆48Updated 3 years ago
- An Intrusion Detection System based on Deep Belief Networks☆90Updated 3 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Updated 3 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆27Updated last year
- source code for USENIX Security paper xNIDS☆57Updated last year
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Updated 2 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆51Updated last year
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆198Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- ☆31Updated 2 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Updated 5 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆32Updated 3 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49Updated 5 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆190Updated 4 years ago
- CICIDS2017 dataset☆70Updated 4 years ago
- Network System Intrusion Detection using Graph Neural Networks☆20Updated 2 years ago
- Deep learning models for network intrusion detection☆40Updated 2 years ago
- ☆24Updated 5 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Updated 5 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Updated 5 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆60Updated last year
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆50Updated last year
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Updated 3 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 5 years ago
- IDS abnormal traffic detection tensorflow☆44Updated 6 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Updated last year
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆122Updated last year
- ramyaelineni5 / ML-based-Network-Intrusion-Detection-using-Cyber-Dataset-CSE-CIC-IDS2018-to-classify-network-attacks☆44Updated 5 years ago
- Intrusion Detection Based on Convolutional Neural Network with kdd99 data set☆57Updated 6 years ago