KitNET is a lightweight online anomaly detection algorithm, which uses an ensemble of autoencoders.
☆258Mar 28, 2024Updated 2 years ago
Alternatives and similar repositories for KitNET-py
Users that are interested in KitNET-py are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆385Mar 24, 2026Updated last month
- Code for our submission to the WTMC 2021 workshop☆15Jul 14, 2021Updated 4 years ago
- Non-official implementation of Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection☆24Jun 8, 2022Updated 3 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Hybrid Isolation Forest☆24Sep 20, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is a paper list about Machine Learning for IDSes☆90Aug 27, 2024Updated last year
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆142Oct 30, 2023Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆85Jan 13, 2022Updated 4 years ago
- ☆26Mar 24, 2023Updated 3 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆197Sep 3, 2023Updated 2 years ago
- Anomaly detection for streaming data using autoencoders☆206Apr 26, 2022Updated 4 years ago
- ☆15Apr 25, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 6 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆99Aug 1, 2023Updated 2 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆36May 6, 2021Updated 5 years ago
- Process-Aware Stealthy Attack Detection☆15Oct 17, 2018Updated 7 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆771May 8, 2019Updated 7 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 7 years ago
- source code for USENIX Security paper xNIDS☆61Aug 27, 2024Updated last year
- ☆29May 6, 2021Updated 5 years ago
- (MLSys' 21) An Acceleration System for Large-scare Unsupervised Heterogeneous Outlier Detection (Anomaly Detection)☆395Mar 24, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- Streaming Anomaly Detection Framework in Python (Outlier Detection for Streaming Data)☆287Apr 13, 2026Updated last month
- A collection of anomaly detection methods (iid/point-based, graph and time series) including active learning for anomaly detection/discov…☆873May 22, 2024Updated last year
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆298Dec 22, 2023Updated 2 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆20Dec 10, 2024Updated last year
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Jun 10, 2020Updated 5 years ago
- ☆34Oct 14, 2023Updated 2 years ago
- ☆19Oct 11, 2021Updated 4 years ago
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Jun 16, 2023Updated 2 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 6 years ago
- Pytorch code for ens_adv_train☆17Jun 7, 2019Updated 6 years ago
- Repository of the paper "A Systematic Evaluation of Deep Anomaly Detection Methods for Time Series".☆597Apr 13, 2026Updated last month
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆15Mar 5, 2026Updated 2 months ago
- Core streaming heterogeneous graph clustering and anomaly detection code (KDD 2016)☆42Apr 23, 2020Updated 6 years ago
- Material from the DARPA Transparent Computing Program☆237Apr 29, 2020Updated 6 years ago