Based on the CICIDS2017 dataset and Pytorch platform
☆30May 8, 2019Updated 7 years ago
Alternatives and similar repositories for Anomaly-Detection
Users that are interested in Anomaly-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆42Jun 15, 2020Updated 5 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 6 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆39Aug 8, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- using 2d-cnn to classify network traffic☆21Apr 10, 2020Updated 6 years ago
- CICIDS2017 dataset☆70Jan 4, 2022Updated 4 years ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Dec 8, 2024Updated last year
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆75Apr 6, 2025Updated last year
- ☆22Jun 20, 2024Updated last year
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆55Apr 9, 2019Updated 7 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆771May 8, 2019Updated 7 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆238Nov 16, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆49Jun 13, 2024Updated last year
- A GAN-based model focused on anomaly detection in discrete dataset☆26Dec 30, 2019Updated 6 years ago
- ☆54Nov 11, 2021Updated 4 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 5 years ago
- Paper "Optimization of Convolutional Neural Network Using the Linearly Decreasing Weight Particle Swarm Optimization" Program☆11Mar 9, 2022Updated 4 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- Extracting data and analyzing the network traffic flow☆13Jul 19, 2018Updated 7 years ago
- Repository for ICML2022☆17Dec 12, 2022Updated 3 years ago
- Basic Machine learning projects and assignments done by me.☆34Aug 12, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆17Jan 6, 2022Updated 4 years ago
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆148Oct 12, 2021Updated 4 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 7 years ago
- about 5G doc and code☆11Jun 14, 2019Updated 6 years ago
- ☆11May 14, 2020Updated 5 years ago
- Robust Log-Based Anomaly Detection on Unstable Log Data☆18Feb 24, 2020Updated 6 years ago
- ☆23Sep 8, 2025Updated 8 months ago
- ☆16May 16, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- source code for USENIX Security paper xNIDS☆61Aug 27, 2024Updated last year
- A Snort 3 Machine Learning-based Inspector for Bidirectional Network Flow Classification.☆19Mar 22, 2020Updated 6 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆203Sep 8, 2021Updated 4 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- A Dataset for the task of Malicious URL Detection☆20Jan 18, 2018Updated 8 years ago