zhenlus / GNN-IDSLinks
A Graph Neural Network-based Intrusion Detection System
☆27Updated last year
Alternatives and similar repositories for GNN-IDS
Users that are interested in GNN-IDS are comparing it to the libraries listed below
Sorting:
- NEGSC☆44Updated last year
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Updated last year
- A PyTorch implementation of of Anomal-E.☆38Updated 3 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Updated last year
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Updated last year
- CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level☆19Updated 6 months ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Updated 2 years ago
- ☆22Updated 2 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆37Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆99Updated 3 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆17Updated last year
- ☆21Updated 11 months ago
- ☆53Updated 4 years ago
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Updated 5 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Updated 2 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆76Updated 4 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆40Updated 8 months ago
- ☆11Updated 4 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆26Updated last year
- ☆10Updated last year
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆19Updated 2 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆34Updated 2 years ago
- Multivariate Time Series Anomaly Detection from the Perspective of Graph Relational Learning☆28Updated 3 years ago
- Anomaly Detection using PCA and BiGAN☆14Updated 5 years ago
- ☆74Updated 4 years ago
- Network System Intrusion Detection using Graph Neural Networks☆20Updated 2 years ago
- Rule Extraction from Unsupervised Anomaly Detection in Security☆21Updated 8 months ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆47Updated 3 years ago
- ☆21Updated 5 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆21Updated 2 years ago