ptiagi / IP2VecLinks
This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses
☆14Updated last month
Alternatives and similar repositories for IP2Vec
Users that are interested in IP2Vec are comparing it to the libraries listed below
Sorting:
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆65Updated 5 years ago
- A PyTorch implementation of of E-GraphSAGE.☆93Updated 3 years ago
- ☆52Updated 4 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆17Updated 2 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 3 years ago
- A research project of anomaly detection on dataset IoT-23☆104Updated last year
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 6 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26Updated 5 years ago
- ☆70Updated 3 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆44Updated last year
- An automatic packet crafting tool for evading learning-based NIDS☆84Updated 3 years ago
- CICIDS2017 dataset☆71Updated 3 years ago
- ☆19Updated 3 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆90Updated 5 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆359Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆190Updated 2 years ago
- ☆28Updated 2 years ago
- Network traffic classifier based on machine learning algorithms☆47Updated 3 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆49Updated last year
- A PyTorch implementation of of Anomal-E.☆36Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- Anomaly Detection using PCA and BiGAN☆14Updated 5 years ago
- ☆94Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆23Updated last year
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆92Updated last year
- ☆26Updated 2 years ago