Network Intrusion Detection System(Abnormal Detection)
☆11Jun 14, 2020Updated 5 years ago
Alternatives and similar repositories for AE-IDS
Users that are interested in AE-IDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Autoencoder approach to detect attacks/intrusions in a network☆10Mar 25, 2023Updated 2 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 2 years ago
- Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)☆19Jul 9, 2019Updated 6 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Intrusion detection system using CNN and RNN☆25Sep 23, 2019Updated 6 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- ☆19Feb 17, 2021Updated 5 years ago
- SMOTE-BD: A distributed Synthetic Minority Oversampling Technique (SMOTE) for Big Data.☆10Apr 1, 2019Updated 6 years ago
- Implementation of novel oversampling algorithms.☆34Oct 20, 2025Updated 5 months ago
- ROSE: Robust Online Self-Adjusting Ensemble for Continual Learning from Imbalanced Drifting Data Streams☆10Jun 24, 2024Updated last year
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- IDS abnormal traffic detection tensorflow☆44Jul 25, 2019Updated 6 years ago
- Anomaly IDS using a one-class autoencoder.☆11Oct 31, 2019Updated 6 years ago
- 基于LangGraph和MCP的智能工具集成平台 - AI Agent with Multiple MCP Tools Integration☆20Aug 5, 2025Updated 7 months ago
- This clustering based anomaly detection project implements unsupervised clustering algorithms on the NSL-KDD and IDS 2017 datasets☆59Dec 5, 2019Updated 6 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Feb 15, 2018Updated 8 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- A reliable mobile-web template built on Vue, Vue-CLI, Vuex, Vue-Router, Vant, Axios, Scss, Mock, Eslint and Viewport adaptation scheme. 基…☆15Jul 26, 2021Updated 4 years ago
- the source code of the paper named as: Solar Irradiance forecasting using dynamic ensemble selection☆13Mar 24, 2022Updated 4 years ago
- ☆15Feb 15, 2023Updated 3 years ago
- Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.☆23May 19, 2023Updated 2 years ago
- ☆11Oct 3, 2021Updated 4 years ago
- The given information of network connection, model predicts if connection has some intrusion or not. Binary classification for good and b…☆11Aug 10, 2019Updated 6 years ago
- This repository is for exploring various ML and DL techniques for network intrusion detection☆10Jun 21, 2020Updated 5 years ago
- A sampling SVDD algorithm for large datasets.☆17Jun 20, 2016Updated 9 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year