基于IDS 2018数据集使用LightGBM和XGBoost实现DDoS流量分类 sFlow RT&Mininet流量采集与分类 杭电综合项目实践
☆30Dec 25, 2020Updated 5 years ago
Alternatives and similar repositories for IDS2018-DDoS-Traffic-Classify
Users that are interested in IDS2018-DDoS-Traffic-Classify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Normalized network traffic entropy-based DDoS detection in P4☆13May 9, 2024Updated last year
- CSE-CIC-IDS-2018 analyze with Random Forest☆30Apr 4, 2021Updated 4 years ago
- Decision Trees Inference☆14Apr 25, 2018Updated 7 years ago
- Code and models of the paper "FPGA accelerator for Gradient Boosting Decision Trees".☆15Updated this week
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Pytorch Implementation of APE-GAN☆15Oct 29, 2017Updated 8 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- Traffic Classification using Logistic Regression and K-Means Clustering.☆30Jun 19, 2020Updated 5 years ago
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 4 years ago
- Genetic Algorithm for Feature Selection☆13Mar 9, 2019Updated 7 years ago
- A hands-free tool for watching video and doing homework&exam faster | 一款快速完成视频观看、小测及考试的解放双手工具☆13Jun 21, 2019Updated 6 years ago
- 《边缘计算:从零搭建云、边、端协同的边缘计算系统》的官方资料托管仓库。☆14Aug 24, 2021Updated 4 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Oct 16, 2021Updated 4 years ago
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆139Oct 30, 2023Updated 2 years ago
- Multi-label feature selection using Ant colony optimization☆16Jun 28, 2021Updated 4 years ago
- Layer 7 DDoS tool that supports sophisticated attack methods.☆26Jul 6, 2025Updated 8 months ago
- This is the code repo for the paper <UTC-IE: A Unified Token-pair Classification Architecture for Information Extraction>☆15Aug 10, 2023Updated 2 years ago
- Transfer Convolutional Neural Network for Cross-Project Defect Prediction☆25Oct 22, 2025Updated 5 months ago
- tcp stream dump with BPF filter rules | bidirection | domain☆48Apr 26, 2019Updated 6 years ago
- Submitted systems of SDPRA 2021 shared task☆10Feb 22, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The repository of 6GAN, an IPv6 multi-pattern target generation algorithm using Generative Adversarial Nets with reinforcement learning. …☆21Dec 16, 2021Updated 4 years ago
- L2Fuzz Source Code☆44Dec 15, 2023Updated 2 years ago
- ☆20Sep 5, 2024Updated last year
- Example python programs for ns-3☆15Dec 4, 2017Updated 8 years ago
- ☆12Nov 2, 2021Updated 4 years ago
- 课程设计——中国教育网网络拓扑探测☆10Apr 8, 2024Updated last year
- CoSaMP algorithm in Python language for sparse recovery problems.☆10Jan 14, 2022Updated 4 years ago
- ☆14Oct 28, 2020Updated 5 years ago
- Docker image for NS-3 Network Simulator v.3.30☆13Apr 11, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Network-wide heavy hitter detection in P4☆13Apr 1, 2020Updated 5 years ago
- ☆16Feb 25, 2022Updated 4 years ago
- ☆11Oct 25, 2023Updated 2 years ago
- 这是一个二分类的决策树系统,用于识别一个网站是否为钓鱼网站☆13Feb 18, 2025Updated last year
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- This toolbox offers 8 machine learning methods including KNN, SVM, DA, DT, and etc., which are simpler and easy to implement.☆23Jan 10, 2021Updated 5 years ago
- The homework of Web Security☆21Nov 14, 2018Updated 7 years ago