ole-knf / A-bidirectional-GPT-approach-for-detecting-malicious-network-trafficLinks
This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communication patterns and thereby score network packets.
☆10Updated 2 years ago
Alternatives and similar repositories for A-bidirectional-GPT-approach-for-detecting-malicious-network-traffic
Users that are interested in A-bidirectional-GPT-approach-for-detecting-malicious-network-traffic are comparing it to the libraries listed below
Sorting:
- source code for USENIX Security paper xNIDS☆54Updated last year
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 5 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆101Updated 3 weeks ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆74Updated 4 months ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆76Updated 4 years ago
- ☆30Updated last year
- ☆88Updated last year
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆36Updated last year
- ☆75Updated 9 months ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆20Updated 10 months ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆72Updated 6 months ago
- Flow Interaction Graph based attack traffic detection system.☆171Updated last year
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆45Updated 3 months ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆187Updated 2 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated last year
- Efficient Network Traffic Classification via Pre-training Unidirectional Mamba☆137Updated 6 months ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆58Updated 9 months ago
- ☆155Updated 2 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆37Updated 5 years ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆22Updated 5 years ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆84Updated last year
- Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detec…☆18Updated 2 years ago
- Traffic dataset USTC-TFC2016☆146Updated 6 years ago
- ☆47Updated 3 years ago
- 网络流量领域工具库、公开数据集及加密流量解析方法☆84Updated 2 years ago
- A tunneled flooding traffic detection system.☆28Updated 10 months ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆17Updated 2 years ago
- The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in rea…☆322Updated 6 months ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆84Updated last year
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆21Updated 6 months ago