AkhilSinghRana / Network-Anomaly-DetectionLinks
This project is created to show how machine learning can be used to detect anomalies in network traffic.
☆41Updated 4 years ago
Alternatives and similar repositories for Network-Anomaly-Detection
Users that are interested in Network-Anomaly-Detection are comparing it to the libraries listed below
Sorting:
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆44Updated 2 years ago
- Machine Learning in Cybersecurity☆83Updated 2 weeks ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆25Updated 2 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆26Updated 3 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆85Updated 4 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆173Updated 3 years ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆64Updated last year
- Machine Learning Algorithms on NSL-KDD dataset☆98Updated 6 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 6 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 4 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- AI & Machine Learning: Detection and Classification of Network Traffic Anomalies based on IoT23 Dataset☆74Updated 3 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆206Updated last year
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆23Updated 3 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆223Updated 2 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆134Updated 3 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆87Updated last year
- Machine Learning and Deep Learning models for Anomaly Detection☆9Updated 6 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆41Updated last year
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆67Updated last year
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆12Updated 4 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Updated 6 years ago
- Baseline experiments on training a Decision Tree Classifier and a Random Forest Classifier using Grid Search with Cross Validation on the…☆46Updated 3 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆46Updated 11 months ago
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆26Updated 3 years ago
- A research project of anomaly detection on dataset IoT-23☆97Updated 8 months ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆33Updated 5 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- CICIDS2017 dataset☆69Updated 3 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆69Updated 4 years ago