This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and HMM.
☆23Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for DL_based_IDS
Users that are interested in DL_based_IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intrusion detection system using CNN and RNN☆25Sep 23, 2019Updated 6 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆45Jun 3, 2019Updated 6 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Aug 12, 2017Updated 8 years ago
- Machine-learning-based intrusion detection☆38Jul 13, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 使用卷积神经网络进行网络入侵检测,正确率可达99.5%☆197Jun 2, 2019Updated 6 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 8 years ago
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14May 16, 2021Updated 4 years ago
- Created Network Intrusion Detection System using Pytorch☆15Oct 15, 2020Updated 5 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- python手写,不使用现有框架,实现全连接BP神经网络,并利用其在MNIST数据集上完成手写数字识别任务☆13Apr 11, 2022Updated 3 years ago
- ☆14Mar 13, 2026Updated last week
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- Anomaly IDS using a one-class autoencoder.☆11Oct 31, 2019Updated 6 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- DDoS attacks detection based on SVM and mitigation in a Software-Defined Network.☆30Jun 5, 2022Updated 3 years ago
- ☆11May 24, 2022Updated 3 years ago
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Jul 18, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- Try Openmax with MNIST Fashion dataset☆11Jul 22, 2018Updated 7 years ago
- VoIP honeypot system☆22Apr 2, 2024Updated last year
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- Here is my implementation of Center Loss with Keras☆11May 2, 2018Updated 7 years ago
- Keras Implementation of "Towards K-means-friendly Spaces: Simultaneous Deep Learning and Clustering"☆11Feb 4, 2020Updated 6 years ago
- Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.☆23May 19, 2023Updated 2 years ago
- Bayesian Physics-Informed Neural Networks for Robust System Identification of Power Systems☆13May 17, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- This project is about the undergraduate thesis, the main idea is about route allocation algorithm.☆11Mar 28, 2020Updated 5 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆17Jul 9, 2025Updated 8 months ago
- Multi-head SSH honeypot system.☆24Mar 21, 2024Updated 2 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- mnist classify using center loss☆13Sep 20, 2018Updated 7 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago