pajola / XeNIDS
Official repository of the paper "The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems".
☆9Updated 3 years ago
Alternatives and similar repositories for XeNIDS
Users that are interested in XeNIDS are comparing it to the libraries listed below
Sorting:
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆12Updated 2 months ago
- ☆9Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 8 months ago
- ☆21Updated 6 months ago
- ☆48Updated 3 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- FL-based intrusion detection system development using model averaging.☆37Updated 2 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆44Updated 7 months ago
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆46Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆34Updated 4 years ago
- Deep learning models for network intrusion detection☆35Updated 2 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆9Updated 2 years ago
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆10Updated 2 years ago
- ☆9Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆47Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆12Updated last year
- A PyTorch implementation of of E-GraphSAGE.☆88Updated 2 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆43Updated 5 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆32Updated 4 years ago
- Adaptive Federated Learning Approach to DDoS attack detection☆46Updated 5 months ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆68Updated 4 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 4 years ago
- An Intrusion Detection System based on Deep Belief Networks☆83Updated 2 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆13Updated 2 years ago
- ☆11Updated last year