This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and HMM.
☆23Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for DL_based_IDS
Users that are interested in DL_based_IDS are comparing it to the libraries listed below
Sorting:
- Intrusion detection system using CNN and RNN☆25Sep 23, 2019Updated 6 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆45Jun 3, 2019Updated 6 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Aug 12, 2017Updated 8 years ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆79Jun 9, 2025Updated 8 months ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- 使用卷积神经网络进行网络入侵检测,正确率可达99.5%☆197Jun 2, 2019Updated 6 years ago
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 7 years ago
- Code for Intrusion Detection Systems and Encrypted Traffic Classification [No Further Updates]☆43Aug 10, 2021Updated 4 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- DDoS attacks detection based on SVM and mitigation in a Software-Defined Network.☆30Jun 5, 2022Updated 3 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- Machine-learning-based intrusion detection☆38Jul 13, 2018Updated 7 years ago
- ☆14Jan 8, 2026Updated last month
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆93Oct 18, 2019Updated 6 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆16Jul 9, 2025Updated 7 months ago
- Convert PHP code into PHP opcode, use GaussianNB for training☆10Mar 21, 2020Updated 5 years ago
- This project is about the undergraduate thesis, the main idea is about route allocation algorithm.☆11Mar 28, 2020Updated 5 years ago
- Keras Implementation of "Towards K-means-friendly Spaces: Simultaneous Deep Learning and Clustering"☆11Feb 4, 2020Updated 6 years ago
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- 基于神经网络的 PHP webshell检测器,目前有Attention与LSTM两种网络结构,以OPCODE作特征基础☆11Nov 28, 2019Updated 6 years ago
- This repository houses my implementation of a Self-Attention layer in Keras to be used for multivariate time series machine learning prob…☆10Sep 18, 2020Updated 5 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- A Web-Application based service which can control/assign the bandwidth of a Virtual Network based on Mininet using RYU as the SDN Control…☆12Apr 24, 2020Updated 5 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- Large-scale SDN emulator based on Mininet☆14Feb 28, 2017Updated 9 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆11Apr 22, 2021Updated 4 years ago
- A toolbox for Distribution Optimal Power Flow (D-OPF) Algorithms☆12Feb 10, 2020Updated 6 years ago
- A Deep Reinforcement Learning Approach For Software-Defined Networking Routing Optimisation☆14Nov 12, 2024Updated last year
- ☆14Feb 19, 2025Updated last year
- A prototype for an architecture that uses Machine Learning to detect abnormalities in the SDN network packet flow, built by Ryu SDN and m…☆15Jun 25, 2023Updated 2 years ago
- Security management in SDN using Reinforcement Learning☆14Dec 8, 2022Updated 3 years ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 5 years ago
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.☆13May 12, 2021Updated 4 years ago