ole-knf / A-bidirectional-GPT-approach-for-detecting-malicious-network-trafficLinks
This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communication patterns and thereby score network packets.
☆11Updated 2 years ago
Alternatives and similar repositories for A-bidirectional-GPT-approach-for-detecting-malicious-network-traffic
Users that are interested in A-bidirectional-GPT-approach-for-detecting-malicious-network-traffic are comparing it to the libraries listed below
Sorting:
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆65Updated 5 years ago
- source code for USENIX Security paper xNIDS☆59Updated last year
- A curation of awesome papers, datasets and tools about network traffic analysis.☆124Updated 2 months ago
- ☆94Updated 2 years ago
- ☆34Updated last year
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆79Updated 4 years ago
- ☆83Updated 11 months ago
- The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in rea…☆384Updated last month
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆76Updated 6 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆86Updated last year
- ☆48Updated 3 years ago
- Flow Interaction Graph based attack traffic detection system.☆182Updated last year
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆197Updated 2 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆38Updated 5 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆59Updated 11 months ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated last year
- ☆155Updated 2 years ago
- Code for the AAAI'23 paper "Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Represen…☆131Updated last year
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Updated 3 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆89Updated 3 years ago
- A tunneled flooding traffic detection system.☆30Updated last year
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆123Updated last year
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆18Updated 2 years ago
- ☆31Updated 5 months ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆51Updated last year
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆97Updated 2 years ago
- 网络流量领域工具库、公开数据集及加密流量解析方法☆92Updated 2 years ago
- Journal Article: Telematics and Informatics Reports☆11Updated 2 years ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆279Updated this week