zhenlus / GNN-IDSLinks
A Graph Neural Network-based Intrusion Detection System
☆19Updated last year
Alternatives and similar repositories for GNN-IDS
Users that are interested in GNN-IDS are comparing it to the libraries listed below
Sorting:
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆17Updated 2 months ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆11Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆14Updated last year
- NEGSC☆37Updated last year
- A PyTorch implementation of of Anomal-E.☆34Updated 2 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆13Updated last year
- ☆20Updated 7 months ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆35Updated 2 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆17Updated last year
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆11Updated last year
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Updated 2 years ago
- ☆11Updated 3 years ago
- ☆11Updated last year
- ☆49Updated 3 years ago
- ☆13Updated last year
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆17Updated last year
- ☆20Updated 2 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆71Updated 3 years ago
- A PyTorch implementation of of E-GraphSAGE.☆90Updated 3 years ago
- ☆74Updated 4 years ago
- Anomaly Detection using PCA and BiGAN☆13Updated 4 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆15Updated 4 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 11 months ago
- ☆16Updated 3 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Updated 2 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆33Updated 4 months ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆45Updated 2 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Updated 5 years ago
- Unofficial implementation of the KDD2020 paper "USAD: UnSupervised Anomaly Detection on multivariate time series" on two datasets cited i…☆69Updated 2 years ago