Faridbg / CNN_UNSW-NB15View external linksLinks
DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES
☆14Jun 14, 2020Updated 5 years ago
Alternatives and similar repositories for CNN_UNSW-NB15
Users that are interested in CNN_UNSW-NB15 are comparing it to the libraries listed below
Sorting:
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15May 17, 2022Updated 3 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆90Jan 24, 2018Updated 8 years ago
- using machine-learning to detecte instruction☆29Oct 21, 2019Updated 6 years ago
- clean data ,feature selection , svm based kdd99☆26Oct 18, 2019Updated 6 years ago
- Generate high quality images for each class even with an imbalanced dataset. An enhanced version of Balancing GAN.☆41Jan 26, 2026Updated 2 weeks ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆272Apr 5, 2020Updated 5 years ago
- ☆11Sep 8, 2022Updated 3 years ago
- Adaptive Federated Learning Approach to DDoS attack detection☆53Feb 2, 2026Updated last week
- improved by ACWGAN-gp☆10Feb 18, 2020Updated 5 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆45Jun 3, 2019Updated 6 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago
- ☆12Jul 8, 2022Updated 3 years ago
- 实现Android手机下 类似今日头条 视频播放列表☆12Apr 23, 2019Updated 6 years ago
- Black Widow Optimization implemented in pure Python.☆14Oct 6, 2022Updated 3 years ago
- Reproduction code for WGAN-LP☆15Dec 27, 2017Updated 8 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- A simple federated learning implementation on MNIST dataset using PySyft. Main goal of the project was to get used to the PySyft federate…☆13Apr 19, 2024Updated last year
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated last year
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- A HYBRID APPROACH TO ANOMALY DETECTION USING FUZZY LOGIC TUNED WITH EVOLUTIONARY ALGORITHMS☆16Dec 12, 2014Updated 11 years ago
- CNN with attention and CNN_LSTM_attention(pytorch)☆18Dec 3, 2019Updated 6 years ago
- ☆15Mar 24, 2023Updated 2 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- ☆21Jan 27, 2025Updated last year
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Secure and utility-aware data collection with condensed local differential privacy☆17Apr 13, 2020Updated 5 years ago
- Modeling Economies and Markets with NetLogo☆21Oct 20, 2018Updated 7 years ago
- ☆21Sep 21, 2020Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆92Sep 19, 2020Updated 5 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago