Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have been successfully implemented in the areas such as computer vision and natural language processing (NLP). RNN model is compared with J48, Artificial Neural Network, Random Forest, Support Vector Machine and other …
☆24Jan 11, 2021Updated 5 years ago
Alternatives and similar repositories for Deep-learning-for-intrusion-detection-using-Recurrent-Neural-network-RNN
Users that are interested in Deep-learning-for-intrusion-detection-using-Recurrent-Neural-network-RNN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆53Aug 10, 2023Updated 2 years ago
- Long Short-term Memory, Recurrent Neural Network method was used to detect the DDoS attack☆11Aug 12, 2021Updated 4 years ago
- Journal Article: IEEE Access☆21Oct 23, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Mar 24, 2023Updated 3 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Jun 14, 2021Updated 4 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- ☆43Dec 26, 2020Updated 5 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆14Aug 24, 2019Updated 6 years ago
- An R package to generate and plot postestimation quantities after estimating Bayesian regression models using MCMC☆13Aug 18, 2025Updated 8 months ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Created by Zac Steer. SEO contest for CS470: Information Storage and Retrieval. The goal is to produce a website that is ranked first for…☆15Oct 4, 2018Updated 7 years ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 5 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆148Oct 12, 2021Updated 4 years ago
- Digital Image Processing Learning Notes.☆19Apr 3, 2019Updated 7 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 8 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- Intrusion detection engine for Cloud Systems built using Alternative Fuzzy C-mean Clustering and Artificial Neural Network☆19May 8, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- datasets from my cyber security research papers☆10Jan 12, 2021Updated 5 years ago
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Using NSL_KDD data☆29Mar 3, 2019Updated 7 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- Deep neural network (DNN) implementation for inference tasks☆13Jul 4, 2019Updated 6 years ago
- 北京市预约挂号统一平台挂号小助手☆11Sep 5, 2019Updated 6 years ago
- ☆14May 28, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- ☆15Jan 30, 2025Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- Intrusion Detection System - IDS example using Dense, Conv1d and Lstm layers in Keras / TensorFlow☆25Apr 28, 2023Updated 3 years ago
- Quantized Tensorflow Estimator for Google EdgeTpu Accelerator, Dev Board and Intel Neural Compute Stick 2☆14May 9, 2019Updated 6 years ago
- Using Bayesian inference to mine rule sets☆12Jan 9, 2020Updated 6 years ago