This project is created to show how machine learning can be used to detect anomalies in network traffic.
☆57Sep 26, 2020Updated 5 years ago
Alternatives and similar repositories for Network-Anomaly-Detection
Users that are interested in Network-Anomaly-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detection of network traffic anomalies using unsupervised machine learning☆28Jan 26, 2022Updated 4 years ago
- Anomaly Detection in Network Traffic using different clustering algorithm.☆18Jun 8, 2017Updated 8 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆238Nov 16, 2022Updated 3 years ago
- Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.☆15Oct 17, 2020Updated 5 years ago
- A research & development project to create and deploy a Network-based Intrusion Detection System (IDS) to detect intruders on a distribut…☆12Jan 9, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Network Anomaly Detection system that leverages machine learning to monitor and identify unusual activities in network traffic in real-…☆27Jun 19, 2024Updated last year
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 7 years ago
- This project aims to detect the anomalies in Web-Traffic using a C-LSTM architecture.☆26May 25, 2020Updated 5 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆52Mar 12, 2026Updated last month
- 定义了网络流量数据的分布外数据类型,其次介绍了两个检测方法使用到的知识或技术,并利用这些技术知识设计了基于两种检测方法的分布外异常检测系统。☆10Sep 26, 2023Updated 2 years ago
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Oct 2, 2020Updated 5 years ago
- Classifying network traffic using machine learning approach☆24Jul 5, 2020Updated 5 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- ☆19Feb 22, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆19Jul 8, 2020Updated 5 years ago
- Product Recommender System for Retail Dataset☆14Sep 22, 2020Updated 5 years ago
- Network Traffic Classification with Graph Neural Networks☆12Nov 4, 2023Updated 2 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- Platypus Educational Samples☆23May 21, 2021Updated 4 years ago
- script to analyse data traffic on the Helium network by accessing the blockchain API☆17Aug 31, 2022Updated 3 years ago
- Cookie & Logins stealer for Firefox + Chrome, demonstration only☆12Apr 5, 2023Updated 3 years ago
- Visual-Text dataset based on NFT metadata☆19Nov 7, 2024Updated last year
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Oct 5, 2025Updated 6 months ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- PyTorch implementation of the paper "Privacy-preserving Few-shot Traffic Detection against Advanced Persistent Threats via Federated Meta…☆22Dec 14, 2023Updated 2 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆24Oct 16, 2020Updated 5 years ago
- My machine learning algortihms implementations. Currently decision tree, and linear/logistic regression.☆28Oct 22, 2016Updated 9 years ago
- MNASNet implementation and pre-trained model in PyTorch☆10Mar 20, 2019Updated 7 years ago
- Definition and Detection of Defects in NFT Smart Contracts☆27Aug 31, 2025Updated 8 months ago
- This repository contains an implementation for design patterns detection. In this task, feature engineering and ensemble learning are app…☆10Jul 30, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆34Nov 26, 2021Updated 4 years ago
- ☆11Mar 13, 2021Updated 5 years ago
- map protocol contracts.☆32Jan 30, 2025Updated last year
- 修改谷歌提供的样例量子卷积神经网络模型,基于KDD99数据集进行训练,实现了网络攻击分类检测。☆39Jan 27, 2022Updated 4 years ago
- Neural Turing Machine for a Multi-Processor System on Chip verified with UVM/OSVVM/FV☆12Apr 20, 2026Updated last week
- ☆25Mar 11, 2022Updated 4 years ago
- Faithful Python implementation of the paper "Towards Deep Symbolic Reinforcement Learning" by Garnelo et al.☆13Mar 23, 2021Updated 5 years ago