sspku-2021 / PBCNNLinks
☆17Updated 4 years ago
Alternatives and similar repositories for PBCNN
Users that are interested in PBCNN are comparing it to the libraries listed below
Sorting:
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆48Updated 5 years ago
- ☆20Updated 9 months ago
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆87Updated 3 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆37Updated 2 years ago
- ☆15Updated last year
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- ☆11Updated 3 years ago
- ☆47Updated 3 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- Anomaly Detection using PCA and BiGAN☆14Updated 5 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆14Updated 3 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆74Updated 5 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated last year
- IDS abnormal traffic detection tensorflow☆45Updated 6 years ago
- ☆28Updated 2 years ago
- using 2d-cnn to classify network traffic☆21Updated 5 years ago
- The repository of FastTraffic, A lightweight method for encrypted traffic fast classification.☆23Updated 10 months ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- Network Traffic Classification with Graph Neural Networks☆11Updated 2 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆50Updated 5 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆47Updated 5 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15Updated 3 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆117Updated 3 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37Updated 4 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆17Updated last year
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆42Updated 4 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Updated 5 years ago
- ☆19Updated 3 years ago