pwwl / ics-anomaly-attribution
Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆14Updated last year
Alternatives and similar repositories for ics-anomaly-attribution
Users that are interested in ics-anomaly-attribution are comparing it to the libraries listed below
Sorting:
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆11Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 8 months ago
- An automatic packet crafting tool for evading learning-based NIDS☆80Updated 3 years ago
- source code for USENIX Security paper xNIDS☆41Updated 8 months ago
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆43Updated 3 weeks ago
- ☆18Updated 4 years ago
- ☆9Updated last year
- ☆16Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆12Updated 9 months ago
- This project is an open-source project based on a GAN network anomaly detection.☆13Updated 9 months ago
- A PyTorch implementation of of E-GraphSAGE.☆88Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆67Updated last month
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆34Updated 4 years ago
- ☆82Updated last year
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆31Updated last month
- ☆48Updated 3 years ago
- ☆24Updated 11 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆138Updated 2 years ago
- ☆19Updated 4 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆25Updated 3 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆15Updated last year
- ☆24Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆12Updated 2 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆64Updated last year
- Rule Extraction from Unsupervised Anomaly Detection in Security☆19Updated 3 weeks ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆13Updated 5 months ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆21Updated 3 years ago