This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection Systems paper.
☆17Aug 27, 2022Updated 3 years ago
Alternatives and similar repositories for t-dfnn
Users that are interested in t-dfnn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆205Apr 20, 2026Updated 2 weeks ago
- Application of novel EC-GAN method on Network Intrusion Detection☆25Dec 24, 2021Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- ☆21Dec 7, 2021Updated 4 years ago
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆29Apr 3, 2022Updated 4 years ago
- ☆44Aug 15, 2023Updated 2 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆46Jun 3, 2019Updated 6 years ago
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- Code for our submission to the WTMC 2021 workshop☆15Jul 14, 2021Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- ☆15Jan 20, 2023Updated 3 years ago
- ☆19Feb 22, 2022Updated 4 years ago
- Anomaly detection in CANBus traffic with LSTM and Autoencoders. Idea borrowed from publications such as: https://ieeexplore.ieee.org/docu…☆19Jan 8, 2021Updated 5 years ago
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆584Apr 1, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- ☆16Dec 29, 2022Updated 3 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆13Jun 21, 2021Updated 4 years ago
- Journal Article: Telematics and Informatics Reports☆13Jun 18, 2023Updated 2 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- Code for the paper: "Continual Learning with Strategic Selection and Forgetting for Network Intrusion Detection" (Infocom 2025)☆25Aug 28, 2025Updated 8 months ago
- ☆19Feb 17, 2021Updated 5 years ago
- ☆18Apr 26, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆43Dec 26, 2020Updated 5 years ago
- A General Toolkit for Advanced Online Learning, Online Active Learning, Online Semi-supervised Learning Approaches☆23Sep 28, 2025Updated 7 months ago
- 书籍、课程和文章汇总☆12Dec 14, 2022Updated 3 years ago
- ☆21Jul 12, 2022Updated 3 years ago
- ☆11Nov 26, 2019Updated 6 years ago
- Intrusion Detection System using Machine Learning and Ensemble Techniques☆21May 14, 2021Updated 4 years ago
- NLP model and tech for cyber security tasks☆86Mar 22, 2023Updated 3 years ago