The project aims to analyse different types of attacks using the Bot-IoT dataset and also apply & compare different classification algorithms. In the project, machine learning algorithms are applied and tested using ten best features from the dataset.
☆11Oct 19, 2021Updated 4 years ago
Alternatives and similar repositories for Bot-IoT
Users that are interested in Bot-IoT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- ☆11May 1, 2021Updated 4 years ago
- A research project of anomaly detection on dataset IoT-23☆110Feb 22, 2026Updated last month
- Machine Learning and Deep Learning models for Anomaly Detection☆10Mar 10, 2019Updated 7 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆16Feb 6, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Anomaly detection using isolation forest☆11Apr 15, 2019Updated 6 years ago
- User Communities with Machine Learning☆15Sep 29, 2021Updated 4 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- Depend on the GPS trajectory dataset, We do location recommendation and user recommendation.☆17Nov 8, 2018Updated 7 years ago
- ☆12Nov 11, 2022Updated 3 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- AMC-IoT: Automatic Modulation Classification Using Efficient Convolutional Neural Networks for Low Power IoT Devices☆14Jul 13, 2021Updated 4 years ago
- Implementation of Attention-based Fusion for Multi-source Human Image Generation, S. Lathuilière, E. Sangineto, A. Siarohin, N. Sebe, WAC…☆10Oct 9, 2020Updated 5 years ago
- A Simple python script for detection Potential DDoS Attacks☆13Feb 6, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Final Project for Stanford Deep Generative Modeling Class CS236.☆13Dec 14, 2019Updated 6 years ago
- DDOS and Bruteforce prevention and notifications☆16Aug 14, 2023Updated 2 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- 📊 Source code for 'Query a Digital Music Store Database' project☆12Aug 29, 2018Updated 7 years ago
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆31Apr 15, 2025Updated 11 months ago
- As we know that Now-a-days Most of the DDos attacks are often sourced from Cloud and Affect many systems and businesses, resulting in s…☆13Aug 28, 2023Updated 2 years ago
- Source code for AAAI 2021 paper "A Supervised Multi-Head Self-Attention Network for Nested Named Entity Recognition""☆16Jun 16, 2021Updated 4 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆14Jul 10, 2024Updated last year
- A fundamental exploration about EEG-BCI emotion recognition using the SEED dataset & dataset from kaggle.☆11Mar 11, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Differential entropy features of EEG dataset☆13Mar 28, 2023Updated 3 years ago
- ☆25Apr 23, 2022Updated 3 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- ☆13Aug 31, 2023Updated 2 years ago
- Detection of oil spill located area in the Satelite images of Ocean☆16Aug 26, 2019Updated 6 years ago
- Tensorflow Audio Classification Models☆13Jul 21, 2023Updated 2 years ago
- Generalised and highly customisable, hybrid-parallelism, database based, deep learning framework.☆18May 2, 2020Updated 5 years ago
- 个人小主页https://twistedw.github.io☆11Aug 23, 2021Updated 4 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Fl…☆16Apr 29, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Invariant representation learning from EEG within discriminative CNN architectures via adversarial censoring.☆14Feb 5, 2020Updated 6 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 11 years ago
- Creative Adversarial Network-pytorch☆11Jun 30, 2018Updated 7 years ago
- Image Captioning Model Implemented in PyTorch using CNN followed by LSTM☆13Apr 5, 2018Updated 7 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆12Apr 22, 2021Updated 4 years ago
- Beat for traceroute command☆14Oct 5, 2018Updated 7 years ago
- SCADA network attack datasets and process logs☆21May 2, 2017Updated 8 years ago