George9822 / CICIDS_2017and2018_IntrusionDetectionSystemLinks
This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After the reults are given, I compared the results of two classical approaches for supervised learning: RandomForest and SVM on a large public combined dataset made from CICIDS2017 dataset and CICIDS2018.
☆12Updated 3 years ago
Alternatives and similar repositories for CICIDS_2017and2018_IntrusionDetectionSystem
Users that are interested in CICIDS_2017and2018_IntrusionDetectionSystem are comparing it to the libraries listed below
Sorting:
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- An Intrusion Detection System based on Deep Belief Networks☆84Updated 2 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆12Updated 4 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆88Updated last year
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆33Updated 5 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆13Updated 2 years ago
- Intrusion Detection Based on Convolutional Neural Network with kdd99 data set☆56Updated 6 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆175Updated 3 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆178Updated 2 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆10Updated last year
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆46Updated 5 years ago
- ramyaelineni5 / ML-based-Network-Intrusion-Detection-using-Cyber-Dataset-CSE-CIC-IDS2018-to-classify-network-attacks☆43Updated 4 years ago
- manojkumar-github / Intrusion-Detection-System-for-IoT-networks-using-Gated-Recurrent-Neural-Networks-GRUAn Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Updated 7 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆113Updated 2 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 6 years ago
- Deep learning models for network intrusion detection☆37Updated 2 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23Updated 3 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆46Updated last year
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆13Updated 3 years ago
- Intrusion detection system using CNN and RNN☆24Updated 5 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆45Updated 10 months ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆43Updated 6 years ago
- IoT intrusion Detection Model based on neural network and random forests☆46Updated 6 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆73Updated last year
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆12Updated 11 months ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 10 months ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 4 years ago
- ☆44Updated 2 years ago