Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have been successfully implemented in the areas such as computer vision and natural language processing (NLP). RNN model is compared with J48, Artificial Neural Network, Random Forest, Support Vector Machine and other …
☆24Jan 11, 2021Updated 5 years ago
Alternatives and similar repositories for Deep-learning-for-intrusion-detection-using-Recurrent-Neural-network-RNN
Users that are interested in Deep-learning-for-intrusion-detection-using-Recurrent-Neural-network-RNN are comparing it to the libraries listed below
Sorting:
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- Long Short-term Memory, Recurrent Neural Network method was used to detect the DDoS attack☆11Aug 12, 2021Updated 4 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆52Aug 10, 2023Updated 2 years ago
- ☆15Mar 24, 2023Updated 2 years ago
- Journal Article: IEEE Access☆18Oct 23, 2023Updated 2 years ago
- ☆44Dec 26, 2020Updated 5 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆27Jan 6, 2020Updated 6 years ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 4 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆145Oct 12, 2021Updated 4 years ago
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Jun 14, 2021Updated 4 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆78Apr 3, 2021Updated 4 years ago
- Monlan is a collection of Data Science experiments (DRL and other approaches) into FOREX algotrading field. Warning! It's my research pro…☆12Aug 1, 2022Updated 3 years ago
- Intrusion Detection System (IDS) for Wireless Sensor Networks (WSN)☆18Apr 5, 2013Updated 12 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- This project accelerates deep learning models on the edge with the support of running ensemble learning for performance improvement. The …☆11Jun 21, 2022Updated 3 years ago
- ☆14May 28, 2023Updated 2 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- Web app - FX Trading Simulation and Historic Data Visualisation☆10Jun 29, 2016Updated 9 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- new custom module that bridges n8n with Google's powerful Speech API, enabling both speech-to-text and text-to-speech capabilities in you…☆14Mar 11, 2025Updated 11 months ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆12Jun 21, 2021Updated 4 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- A Deep Reinforcement Learning model for high volume and frequency Forex Portfolio Management☆13Jan 11, 2023Updated 3 years ago
- ☆15Jan 30, 2025Updated last year
- ☆10Mar 10, 2019Updated 6 years ago
- ☆11May 24, 2024Updated last year
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 4 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- ☆14Oct 24, 2023Updated 2 years ago
- Learn how you can select the suitable stocks, calculate your daily portfolio value and most of their statistics☆13May 7, 2022Updated 3 years ago
- eAudit suite for recording provenance-related system calls on Linux☆18Jan 16, 2026Updated last month