pwwl / ics-anomaly-attribution
Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆13Updated last year
Alternatives and similar repositories for ics-anomaly-attribution:
Users that are interested in ics-anomaly-attribution are comparing it to the libraries listed below
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 6 months ago
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆43Updated 3 weeks ago
- ☆16Updated 4 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆11Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆77Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆65Updated last year
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆20Updated 3 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆27Updated 6 months ago
- source code for USENIX Security paper xNIDS☆41Updated 7 months ago
- ☆16Updated 2 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆13Updated last year
- A PyTorch implementation of of E-GraphSAGE.☆85Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆33Updated 2 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆11Updated 4 months ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆11Updated 8 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆32Updated 3 years ago
- FL-based intrusion detection system development using model averaging.☆36Updated 2 years ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆13Updated last year
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆13Updated 2 years ago
- ☆9Updated last year
- ☆19Updated 4 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆137Updated 2 years ago
- A Few-shot Based Model-Agnostic Meta-Learning for Intrusion Detection in Security of Internet of Things☆12Updated last month
- ☆23Updated 9 months ago
- ☆78Updated last year
- This project is an open-source project based on a GAN network anomaly detection.☆13Updated 7 months ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆52Updated 2 months ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- ☆46Updated 3 years ago