Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)
☆13Aug 16, 2020Updated 5 years ago
Alternatives and similar repositories for Network-Intrusion-Detection-System-Deep-Learning
Users that are interested in Network-Intrusion-Detection-System-Deep-Learning are comparing it to the libraries listed below
Sorting:
- Based on the CICIDS2017 dataset and Pytorch platform☆29May 8, 2019Updated 6 years ago
- The given information of network connection, model predicts if connection has some intrusion or not. Binary classification for good and b…☆11Aug 10, 2019Updated 6 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- ☆11Jan 8, 2020Updated 6 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆271Apr 5, 2020Updated 5 years ago
- using 2d-cnn to classify network traffic☆21Apr 10, 2020Updated 5 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆220Apr 25, 2024Updated last year
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- Basic Machine learning projects and assignments done by me.☆33Aug 12, 2020Updated 5 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 2 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- 实现一个自己的小语言模型☆11Jun 15, 2024Updated last year
- SMOTE-BD: A distributed Synthetic Minority Oversampling Technique (SMOTE) for Big Data.☆10Apr 1, 2019Updated 6 years ago
- SDN NFV architecture for DDoS mitigation with reinforcement learning: An implementation with ONOS and Containernet☆10Sep 1, 2024Updated last year
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- Final Year project based upon Network Intrusion Detection System☆37Jul 10, 2019Updated 6 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- ☆11Apr 21, 2021Updated 4 years ago
- ☆12Oct 17, 2022Updated 3 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- Convolutional Neural Network Based Optimization Approach for Wireless Resource Management☆10Apr 7, 2021Updated 4 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- about 5G doc and code☆11Jun 14, 2019Updated 6 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- paper code commit-fsmafl☆10Mar 18, 2024Updated last year
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 4 years ago
- Courses in UCAS☆14Jun 12, 2023Updated 2 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- ☆13Apr 6, 2023Updated 2 years ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago