Based on the CICIDS2017 dataset and Pytorch platform
☆29May 8, 2019Updated 6 years ago
Alternatives and similar repositories for Anomaly-Detection
Users that are interested in Anomaly-Detection are comparing it to the libraries listed below
Sorting:
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆39Aug 8, 2020Updated 5 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆16May 18, 2022Updated 3 years ago
- CICIDS2017 dataset☆70Jan 4, 2022Updated 4 years ago
- This clustering based anomaly detection project implements unsupervised clustering algorithms on the NSL-KDD and IDS 2017 datasets☆59Dec 5, 2019Updated 6 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 6 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆237Nov 16, 2022Updated 3 years ago
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆55Apr 9, 2019Updated 6 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Dec 30, 2019Updated 6 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Mar 1, 2022Updated 4 years ago
- ☆22Jun 20, 2024Updated last year
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 11 months ago
- Basic Machine learning projects and assignments done by me.☆33Aug 12, 2020Updated 5 years ago
- 实现一个自己的 小语言模型☆11Jun 15, 2024Updated last year
- Intrusion Detection System using Machine Learning and Deep Learning☆88Dec 27, 2023Updated 2 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- SNA on various social graphs including trading networks & Facebook friendship networks.☆11Jun 17, 2020Updated 5 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆194Sep 8, 2021Updated 4 years ago
- 使用卷积神经网络进行网络入侵检测,正确率可达99.5%☆197Jun 2, 2019Updated 6 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- "Learning Stable Classifiers by Transferring Unstable Features" ICML 2022☆14Jul 24, 2022Updated 3 years ago
- Trust Management for Vehicular Networks☆11Aug 6, 2025Updated 7 months ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- ☆18Sep 8, 2025Updated 5 months ago
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 4 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆13Apr 6, 2023Updated 2 years ago
- ☆11May 9, 2023Updated 2 years ago
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆15Mar 30, 2025Updated 11 months ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago