pwwl / ics-anomaly-attributionLinks
Library of ML-based attribution methods for ICS anomaly detection. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆18Updated 2 years ago
Alternatives and similar repositories for ics-anomaly-attribution
Users that are interested in ics-anomaly-attribution are comparing it to the libraries listed below
Sorting:
- ☆89Updated last year
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated last year
- source code for USENIX Security paper xNIDS☆55Updated last year
- An automatic packet crafting tool for evading learning-based NIDS☆83Updated 3 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Updated 3 years ago
- ☆47Updated 3 years ago
- ☆21Updated 4 years ago
- ☆15Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 5 years ago
- An Intrusion Detection System based on Deep Belief Networks☆87Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆35Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Updated 6 months ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Updated 2 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆28Updated 3 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆190Updated 2 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆117Updated 3 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Updated 11 months ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆58Updated 9 months ago
- T. Shapira and Y. Shavitt, "FlowPic: A Generic Representation for Encrypted Traffic Classification and Applications Identification," in I…☆95Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Updated 2 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆106Updated last month
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆21Updated 6 months ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆17Updated 2 years ago
- CICIDS2017 dataset☆70Updated 3 years ago
- ☆76Updated 9 months ago
- ☆28Updated 2 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆86Updated 2 years ago
- It is a network traffic classifier based on deep learning.☆47Updated last year
- IDS abnormal traffic detection tensorflow☆45Updated 6 years ago