This project is created to show how machine learning can be used to detect anomalies in network traffic.
☆56Sep 26, 2020Updated 5 years ago
Alternatives and similar repositories for Network-Anomaly-Detection
Users that are interested in Network-Anomaly-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆46Jun 13, 2022Updated 3 years ago
- Anomaly Detection in Network Traffic using different clustering algorithm.☆18Jun 8, 2017Updated 8 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆240Nov 16, 2022Updated 3 years ago
- Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.☆15Oct 17, 2020Updated 5 years ago
- LTE Network traffic prediction and Congestion☆11Oct 8, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 7 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆52Mar 12, 2026Updated 2 months ago
- 定义了网络流量数据的分布外数据类型,其次介绍了两个检测方法使用到的知识或技术,并利用这些技术知识设计了基于两种检测方法的分布外异常检测系统。☆10Sep 26, 2023Updated 2 years ago
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Oct 2, 2020Updated 5 years ago
- Classifying network traffic using machine learning approach☆25Jul 5, 2020Updated 5 years ago
- 马甲包检查相似度☆18Jul 16, 2023Updated 2 years ago
- Network Traffic Classification with Graph Neural Networks☆12Nov 4, 2023Updated 2 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- Long Short-Term Memory Recurrent Neural Network for Traffic Prediction in Cellular Networks☆12Sep 28, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Platypus Educational Samples☆23May 21, 2021Updated 4 years ago
- script to analyse data traffic on the Helium network by accessing the blockchain API☆17Aug 31, 2022Updated 3 years ago
- Visual-Text dataset based on NFT metadata☆19Nov 7, 2024Updated last year
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 4 years ago
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- ☆14Jan 22, 2022Updated 4 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆24Oct 16, 2020Updated 5 years ago
- Terminal on Browser☆29Jun 28, 2025Updated 10 months ago
- Lab Book Database Framework with Input, Output, and Reporting Functions☆14Jul 18, 2022Updated 3 years ago
- Definition and Detection of Defects in NFT Smart Contracts☆27Aug 31, 2025Updated 8 months ago
- A comprehensive set of colab notebooks to showcase the principal differences among XAI techniques☆12Aug 4, 2025Updated 9 months ago
- The framework for automatic, robust detection and localisation of objects (primarily faces) through menpo framework.☆11Oct 2, 2020Updated 5 years ago
- ☆11Mar 13, 2021Updated 5 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆58Jun 26, 2024Updated last year
- Deep Learning for Anomaly Deteection☆59Jan 5, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Neural Turing Machine for a Multi-Processor System on Chip verified with UVM/OSVVM/FV☆12May 3, 2026Updated 2 weeks ago
- repo for the paper titled “CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code Generation”☆14Oct 4, 2023Updated 2 years ago
- ☆13Feb 18, 2022Updated 4 years ago
- ☆13May 13, 2017Updated 9 years ago
- From Symbolic Logic Reasoning to Soft Reasoning: A Neural-Symbolic Paradigm☆12Jul 18, 2022Updated 3 years ago
- ☆19Jan 27, 2026Updated 3 months ago
- A Behaviour-Based Fingerprinting Method for Device Identification in the IoT☆29Nov 6, 2022Updated 3 years ago