This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and HMM.
☆23Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for DL_based_IDS
Users that are interested in DL_based_IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 6 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Aug 12, 2017Updated 8 years ago
- Machine-learning-based intrusion detection☆38Jul 13, 2018Updated 7 years ago
- 用python手写神经网络模型☆11Apr 9, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆82Jun 9, 2025Updated 10 months ago
- 使用卷积神经网络进行网络入侵检测,正确率可达99.5%☆199Jun 2, 2019Updated 6 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14May 16, 2021Updated 4 years ago
- Created Network Intrusion Detection System using Pytorch☆15Oct 15, 2020Updated 5 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 3 years ago
- This Repository contains the code to detect intrusions inside a network. The Intrusion detection system uses anomaly based method to dete…☆10Jul 9, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- MATLAB scripts for LoneSTAR: analog beamforming codebooks for full-duplex mmWave communication systems.☆15Mar 5, 2023Updated 3 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆42Aug 10, 2021Updated 4 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- 🕵️ IDS with accuracy rates of 94.4% for misuse detection and 99.0% for anomaly detection☆15Dec 30, 2023Updated 2 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- Anomaly IDS using a one-class autoencoder.☆11Oct 31, 2019Updated 6 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- DDoS attacks detection based on SVM and mitigation in a Software-Defined Network.☆30Jun 5, 2022Updated 3 years ago
- ☆11May 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- This repository implements various Search Based (Heuristic and Incremental) and Sampling Based (Multi Query and Single Query) motion plan…☆16May 28, 2023Updated 2 years ago
- A toolbox for Distribution Optimal Power Flow (D-OPF) Algorithms☆12Feb 10, 2020Updated 6 years ago
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Jul 18, 2018Updated 7 years ago
- Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machine…☆60Oct 31, 2025Updated 5 months ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆765May 8, 2019Updated 6 years ago
- Try Openmax with MNIST Fashion dataset☆11Jul 22, 2018Updated 7 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 6 years ago
- Keras Implementation of "Towards K-means-friendly Spaces: Simultaneous Deep Learning and Clustering"☆11Feb 4, 2020Updated 6 years ago
- Bayesian Physics-Informed Neural Networks for Robust System Identification of Power Systems☆13May 17, 2023Updated 2 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- ☆10Sep 30, 2019Updated 6 years ago
- This project is about the undergraduate thesis, the main idea is about route allocation algorithm.☆11Mar 28, 2020Updated 6 years ago
- ☆11Jul 14, 2019Updated 6 years ago