racsa-lab / Edge-DetectLinks
Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".
☆46Updated 2 years ago
Alternatives and similar repositories for Edge-Detect
Users that are interested in Edge-Detect are comparing it to the libraries listed below
Sorting:
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆35Updated 2 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆85Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Improving Transferability of Network Intrusion Detection in a Federated Learning Setup☆12Updated last year
- ☆45Updated 3 years ago
- ☆49Updated 3 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆18Updated last year
- NEGSC☆37Updated last year
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆46Updated 11 months ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- ☆20Updated 7 months ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆114Updated 2 years ago
- ☆19Updated 4 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆13Updated 3 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23Updated 3 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 11 months ago
- CICIDS2017 dataset☆71Updated 3 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆38Updated last year
- Attention Model for Network Intrusion Detection☆18Updated 6 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆23Updated 4 years ago
- ☆13Updated last year
- ☆87Updated last year
- ☆18Updated last year
- ☆25Updated last year
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆23Updated 3 years ago