ptiagi / IP2VecLinks
This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses
☆12Updated last year
Alternatives and similar repositories for IP2Vec
Users that are interested in IP2Vec are comparing it to the libraries listed below
Sorting:
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- ☆48Updated 3 years ago
- Code for our submission to the WTMC 2021 workshop☆11Updated 3 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆80Updated 3 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- ☆19Updated 3 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 4 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- ☆27Updated last year
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆45Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆25Updated 5 years ago
- ☆18Updated 4 years ago
- Anomaly Detection using PCA and BiGAN☆13Updated 4 years ago
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆89Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆138Updated 2 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 6 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 9 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆35Updated 4 years ago
- Implementation of "How to Achieve High Classification Accuracy with Just a Few Labels: A Semi-supervised Approach Using Sampled Packets"☆33Updated 6 years ago
- Encrypted Network Traffic Classification using Deep Learning☆52Updated last year
- Distributed intelligent malicious traffic detection system based on GAN☆18Updated 5 years ago
- Implementation of AppScanner☆42Updated 2 years ago
- ☆24Updated last year
- Packet Representation Learning for Traffic Classification☆29Updated 6 months ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆16Updated 3 years ago
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆26Updated 6 months ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Updated 5 years ago
- ☆12Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆69Updated 2 months ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆21Updated 4 years ago