这篇教程网络入侵文章深度学习写得很实用,希望能帮到您。
GuansongPang/deviation-network • • 19 Nov 2019
Instead of representation learning, our method fulfills an end-to-end learning of anomaly scores by a neural deviation learning, in which we leverage a few (e. g., multiple to dozens) labeled anomalies and a prior probability to enforce statistically significant deviations of the anomaly scores of anomalies from that of normal data objects in the upper tail. 6 Paper Code
rahulvigneswaran/Intrusion-Detection-Systems • International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2018
In this paper, DNNs have been utilized to predict the attacks on Network Intrusion Detection System (N-IDS). 5 Paper Code
ymirsky/KitNET-py • 25 Feb 2018
In this paper, we present Kitsune: a plug and play NIDS which can learn to detect attacks on the local network, without supervision, and in an efficient online manner. 3 Paper Code
xuhongzuo/DeepOD • • 13 Jun 2018
However, existing unsupervised representation learning methods mainly focus on preserving the data regularity information and learning the representations independently of subsequent outlier detection methods, which can result in suboptimal and unstable performance of detecting irregularities (i. e., outliers). 3 Paper Code
haoyfan/AnomalyDAE • • 10 Feb 2020
In this paper, we propose a deep joint representation learning framework for anomaly detection through a dual autoencoder (AnomalyDAE), which captures the complex interactions between network structure and node attribute for high-quality embeddings. 3 Paper Code
AbertayMachineLearningGroup/network-threats-taxonomy • 9 Jun 2018
This manuscript aims to pinpoint research gaps and shortcomings of current datasets, their impact on building Network Intrusion Detection Systems (NIDS) and the growing number of sophisticated threats. 2 Paper Code
fisher85/ml-cybersecurity • Proceedings of the Institute for System Programming of RAS 2020
The conclusion was made that it is possible to use machine learning methods to detect computer attacks taking into account these limitations. 2 Paper Code
waimorris/E-GraphSAGE • • 30 Mar 2021
This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). 2 Paper Code
pfmarteau/HIF • 10 May 2017
From the identification of a drawback in the Isolation Forest (IF) algorithm that limits its use in the scope of anomaly detection, we propose two extensions that allow to firstly overcome the previously mention limitation and secondly to provide it with some supervised learning capability. 1 Paper Code
lmunoz-gonzalez/Poisoning-Attacks-with-Back-gradient-Optimization • 8 Feb 2018
We show empirically that the adversarial examples generated by these attack strategies are quite different from genuine points, as no detectability constrains are considered to craft the attack. 1 Paper Code
Saurabh2805/kdd_cup_99 • 13 Nov 2018
Applying the SMOTE oversampling technique and random undersampling, we create a balanced version of NSL-KDD and prove that skewed target classes in KDD-99 and NSL-KDD hamper the efficacy of classifiers on minority classes (U2R and R2L), leading to possible security risks. 1 Paper Code
GT-Davood/SBML • Knowledge-Based Systems 2019
Also, the present work is extended for learning in the feature space induced by an RKHS kernel. 1 Paper Code
mhwong2007/LuNet • • 22 Sep 2019
Our experiments on two network traffic datasets show that compared to the state-of-the-art network intrusion detection techniques, LuNet not only offers a high level of detection capability but also has a much low rate of false positive-alarm. 1 Paper Code
dongtsi/TrafficManipulator • • 15 May 2020
Many adversarial attacks have been proposed to evaluate the robustness of ML-based NIDSs. 1 Paper Code
razor08/Efficient-CNN-BiLSTM-for-Network-IDS • 26 Jun 2020
Pattern matching methods usually have a high False Positive Rates whereas the AI/ML based method, relies on finding metric/feature or correlation between set of metrics/features to predict the possibility of an attack. 1 Paper Code
CN-TU/ids-backdoor • 27 Jul 2020
Fully Connected Neural Networks (FCNNs) have been the core of most state-of-the-art Machine Learning (ML) applications in recent years and also have been widely used for Intrusion Detection Systems (IDSs). 1 Paper Code
s-mohammad-hashemi/repo • • 9 Aug 2020
Our evaluation conducted on a dataset with a variety of network attacks shows denoising autoencoders can improve detection of malicious traffic by up to 29% in a normal setting and by up to 45% in an adversarial setting compared to other recently proposed anomaly detectors. 1 Paper Code
ajaychawda58/SOM_DAGMM • • 28 Aug 2020
In this paper, we propose a self-organizing map assisted deep autoencoding Gaussian mixture model (SOMDAGMM) supplemented with well-preserved input space topology for more accurate network intrusion detection. 1 Paper Code
yuweisunn/segmented-FL • • International Joint Conference on Neural Networks (IJCNN) 2020
In this research, a segmented federated learning is proposed, different from a collaborative learning based on single global model in a traditional federated learning model, it keeps multiple global models which allow each segment of participants to conduct collaborative learning separately and rearranges the segmentation of participants dynamically as well. 1 Paper Code
yuweisunn/segmented-FL • • IEEE Open Journal of the Communications Society (Conference version: IJCNN) 2020
We propose Segmented-Federated Learning (Segmented-FL), where by employing periodic local model evaluation and network segmentation, we aim to bring similar network environments to the same group. 1 Paper Code
racsa-lab/EDD • • 3 Feb 2021
Our results demonstrate that in comparison to conventional DLM techniques, our model maintains a high testing accuracy of 99% even with lower resource utilization in terms of cpu and memory. 1 Paper Code
CN-TU/machine-learning-in-ebpf • 19 Feb 2021
eBPF is a new technology which allows dynamically loading pieces of code into the Linux kernel. 1 Paper Code
BNN-UPC/GNN-NIDS • • 30 Jul 2021
To this end, we use a graph representation that keeps flow records and their relationships, and propose a novel Graph Neural Network (GNN) model tailored to process and learn from such graph-structured information. 1 Paper Code
c2dc/ab-trap • 25 Oct 2021
Most research using machine learning (ML) for network intrusion detection systems (NIDS) uses well-established datasets such as KDD-CUP99, NSL-KDD, UNSW-NB15, and CICIDS-2017. 1 Paper Code
pajola/xenids • 9 Mar 2022
By using XeNIDS on six well-known datasets, we demonstrate the concealed potential, but also the risks, of cross-evaluations of ML-NIDS. 1 Paper Code
dreizehnutters/pcapae • • 20 Apr 2022
Using a convGRU-based autoencoder, this thesis proposes a framework to learn spatial-temporal aspects of raw network traffic in an unsupervised and protocol-agnostic manner. 1 Paper Code
bit-ml/anoshift • • 30 Jun 2022
Analyzing the distribution shift of data is a growing research direction in nowadays Machine Learning (ML), leading to emerging new benchmarks that focus on providing a suitable scenario for studying the generalization properties of ML models. 1 Paper Code
othmbela/dbn-based-nids • • 5 Jul 2022
The CICIDS2017 dataset was used to train and evaluate the performance of our proposed DBN approach. 1 Paper Code
waimorris/Anomal-E • • 14 Jul 2022
This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusion and anomaly detection. 1 Paper Code
e389-cnpub/separatingflows • IEEE International Conference on Machine Learning and Applications 2022
In this paper, we show that it is indeed possible to separate packets belonging to different flows purely from patterns observed in the interleaved packet sequence. 1 Paper Code
abdelmageed95/Synthesis-of-Adversarial-DDos-Attacks-Using-Tabular-Generative-Adversarial-Networks • 14 Dec 2022
Network Intrusion Detection Systems (NIDS) are tools or software that are widely used to maintain the computer networks and information systems keeping them secure and preventing malicious traffics from penetrating into them, as they flag when somebody is trying to break into the system. 1 Paper Code
mverkerk/multi-stage-hierarchical-ids • IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2023
An intrusion detection system (IDS), traditionally an example of an effective security monitoring system, is facing significant challenges due to the ongoing digitization of our modern society. 1 Paper Code
labsaint/tsi-gan • 22 Mar 2023
To achieve these goals, we convert each input time-series into a sequence of 2D images using two encoding techniques with the intent of capturing temporal patterns and various types of deviance. 1 Paper Code
hihey54/pragmaticassessment • 30 Apr 2023
Unfortunately, the value of ML for NID depends on a plethora of factors, such as hardware, that are often neglected in scientific literature. 1 Paper Code 基于CNN-BiLSTM-Attention混合神经网络的滚动轴承故障诊断方法 Keras 的预训练权值模型用来进行预测、特征提取和微调(fine-tuning) |