ptiagi / IP2Vec
This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses
☆12Updated last year
Alternatives and similar repositories for IP2Vec:
Users that are interested in IP2Vec are comparing it to the libraries listed below
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- ☆18Updated 2 years ago
- Code for our submission to the WTMC 2021 workshop☆10Updated 3 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- ☆45Updated 3 years ago
- Anomaly Detection using PCA and BiGAN☆13Updated 4 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆24Updated 4 years ago
- Deep learning models for network intrusion detection☆34Updated last year
- manojkumar-github / Intrusion-Detection-System-for-IoT-networks-using-Gated-Recurrent-Neural-Networks-GRUAn Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Updated 6 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆20Updated 2 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆33Updated 6 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆32Updated 3 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆42Updated 8 months ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆60Updated 4 years ago
- ☆16Updated last year
- A PyTorch implementation of of Anomal-E.☆31Updated 2 years ago
- Code for our submission to IEEE CNS 2022☆17Updated last year
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 5 months ago
- ☆74Updated last year
- ☆12Updated 6 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆39Updated 6 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆77Updated 4 years ago
- ☆26Updated last year
- using 2d-cnn to classify network traffic☆20Updated 4 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 4 years ago
- A PyTorch implementation of of E-GraphSAGE.☆84Updated 2 years ago
- ☆21Updated 4 years ago
- Encrypted Network Traffic Classification using Deep Learning☆52Updated 11 months ago
- IoT intrusion Detection Model based on neural network and random forests☆44Updated 6 years ago