zhenlus / GNN-IDSLinks
A Graph Neural Network-based Intrusion Detection System
☆27Updated last year
Alternatives and similar repositories for GNN-IDS
Users that are interested in GNN-IDS are comparing it to the libraries listed below
Sorting:
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Updated last year
- A PyTorch implementation of of Anomal-E.☆37Updated 2 years ago
- NEGSC☆43Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Updated last year
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆19Updated 5 months ago
- A PyTorch implementation of of E-GraphSAGE.☆94Updated 3 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Updated 2 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆37Updated 2 years ago
- ☆21Updated 2 years ago
- ☆20Updated 10 months ago
- ☆53Updated 4 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆18Updated 2 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Updated 5 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆17Updated last year
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Updated 2 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆75Updated 4 years ago
- ☆10Updated last year
- ☆11Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- ☆74Updated 4 years ago
- ☆15Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 5 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆38Updated 7 months ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆24Updated last year
- ☆20Updated 3 years ago
- ☆94Updated 2 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆20Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆48Updated 5 years ago