Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.
☆27Jan 6, 2020Updated 6 years ago
Alternatives and similar repositories for Intrusion-Detection-using-Machine-Learning-on-NSL--KDD-dataset
Users that are interested in Intrusion-Detection-using-Machine-Learning-on-NSL--KDD-dataset are comparing it to the libraries listed below
Sorting:
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- Baseline experiments on training a Decision Tree Classifier and a Random Forest Classifier using Grid Search with Cross Validation on the…☆54Jun 3, 2022Updated 3 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- Network Security Analysis using Machine Learning on the NSL-KDD dataset from the KDD Cup 1999☆21Nov 3, 2019Updated 6 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆30Aug 2, 2023Updated 2 years ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 4 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Provides content useful for IriusRisk threat modelling, including templates, API scripts, libraries and more.☆16Feb 10, 2026Updated 3 weeks ago
- Send logs of processes controlled by PM2 to Elasticsearch 📒🔍☆10Feb 17, 2023Updated 3 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- SMOTE-BD: A distributed Synthetic Minority Oversampling Technique (SMOTE) for Big Data.☆10Apr 1, 2019Updated 6 years ago
- ☆10Nov 30, 2020Updated 5 years ago
- configure different congestion control algorithms☆10Jun 14, 2021Updated 4 years ago
- Visualização dos dados de criminalidade da cidade de São Paulo☆10Dec 27, 2019Updated 6 years ago
- Machine Learning Operations with a denoising diffusion model using a butterfly dataset☆11Jun 2, 2024Updated last year
- An efficient implementation of a stochastic Spiking Neural Network for handwrittend digits recognition☆11Feb 27, 2019Updated 7 years ago
- scripts for performing logistic regression and benford analysis in brazil's declared donnations☆11Jun 30, 2017Updated 8 years ago
- Xilinx Blockchain Machine for Hyperledger Fabric.☆14Oct 30, 2023Updated 2 years ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- Sinalização pra deixar a cidade mais colaborativa, caminhável, saudável, segura, e interessante.☆11Oct 3, 2016Updated 9 years ago
- Modular, flexible, cross-platform workload profiling and characterization☆13Mar 1, 2021Updated 5 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Semi-automated vocabulary generation from semantic vector models☆10Dec 15, 2021Updated 4 years ago
- 北京市预约挂号统一平台挂号小助手☆11Sep 5, 2019Updated 6 years ago
- Deep SNNs with various neural coding methods (rate, phase, burst, TTFS)☆12Feb 15, 2022Updated 4 years ago
- This repository contains the code snippets used in "LLM Prompt Engineering For Developers"☆12Apr 22, 2024Updated last year
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆41Sep 27, 2018Updated 7 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- Turn your Fusion Table into a mobile-friendly searchable web app.☆28Apr 10, 2018Updated 7 years ago
- Medium Article☆11May 15, 2021Updated 4 years ago