zhenlus / GNN-IDSLinks
A Graph Neural Network-based Intrusion Detection System
☆29Updated last year
Alternatives and similar repositories for GNN-IDS
Users that are interested in GNN-IDS are comparing it to the libraries listed below
Sorting:
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆19Updated 6 months ago
- A PyTorch implementation of of Anomal-E.☆38Updated 3 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Updated last year
- NEGSC☆44Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Updated last year
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Updated 2 years ago
- ☆22Updated 2 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Updated last year
- A PyTorch implementation of of E-GraphSAGE.☆99Updated 3 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Updated 5 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆37Updated 2 years ago
- ☆21Updated 11 months ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆40Updated 8 months ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆17Updated last year
- ☆53Updated 4 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆76Updated 4 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆26Updated last year
- ☆21Updated 5 years ago
- Anomaly Detection using PCA and BiGAN☆14Updated 5 years ago
- ☆10Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- Multivariate Time Series Anomaly Detection from the Perspective of Graph Relational Learning☆28Updated 3 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 5 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Updated 2 years ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆47Updated 3 years ago
- ☆10Updated 2 years ago
- ☆17Updated last year
- ☆11Updated 4 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆19Updated 2 years ago
- ☆19Updated last year