Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)
☆19Jul 9, 2019Updated 6 years ago
Alternatives and similar repositories for Intrusion-Detection
Users that are interested in Intrusion-Detection are comparing it to the libraries listed below
Sorting:
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- clean data ,feature selection , svm based kdd99☆26Oct 18, 2019Updated 6 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 9 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Jul 18, 2018Updated 7 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆41Sep 27, 2018Updated 7 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Aug 12, 2017Updated 8 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- SMOTE-BD: A distributed Synthetic Minority Oversampling Technique (SMOTE) for Big Data.☆10Apr 1, 2019Updated 6 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆270Apr 5, 2020Updated 5 years ago
- Public filtered data sets of AIS Trajectories from Danish Waters. Data sets vary in ROI size, time period, included ship types ect. Some …☆13Oct 23, 2023Updated 2 years ago
- The BigBlueButton-Bot interfaces with the platform's backend, enhancing user functionalities without a headless browser.☆12Feb 10, 2026Updated 3 weeks ago
- The original Protocol-oblivious Forwarding (POF) switch by Huawei☆10Sep 1, 2016Updated 9 years ago
- Live Streaming Server based on NGINX and NGINX-RMTP-Module☆11Jul 1, 2020Updated 5 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆295Dec 22, 2023Updated 2 years ago
- 深度学习500问,以问答形式对常用的概率知识、线性代数、机器学习、深度学习、计算机视觉等热点问题进行阐述,以帮助自己及有需要的读者。 全书分为18个章节,50余万字。由于水平有限,书中不妥之处恳请广大读者批评指正。 未完待续............ 如有意合作,联系sc…☆12Jan 21, 2020Updated 6 years ago
- ☆14Aug 9, 2023Updated 2 years ago
- Journal Article: International Journal of Information Technology☆13Jun 27, 2023Updated 2 years ago
- Today satellites provide a surface signature of the temperature with a high spatial frequency: ie a good horizontal resolution but a low …☆13Oct 23, 2019Updated 6 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- A geometric-driven semi-supervised approach for fishing activity detection from AIS data.☆12Aug 24, 2022Updated 3 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆16May 18, 2022Updated 3 years ago
- Python socket 编程实战☆12Apr 24, 2017Updated 8 years ago
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Feb 15, 2018Updated 8 years ago
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆55Apr 9, 2019Updated 6 years ago
- ☆17Jan 6, 2022Updated 4 years ago
- 得力e+APP打卡时间统计助手,用于统计截止使用时刻,当周还需多少打卡时间☆12May 7, 2024Updated last year
- An easy, modularized, DIY Federated Learning framework with many baselines for individual researchers.☆17May 24, 2023Updated 2 years ago
- ST-GAT: Spatio-Temporal Graph Attention Network for TrafficFlow Prediction☆20Dec 30, 2022Updated 3 years ago
- Matlab code for the TNNLS 2023 paper "Efficient Multi-view Clustering via Unified and Discrete Bipartite Graph Learning".☆15Aug 29, 2025Updated 6 months ago
- Computers & Security☆21Oct 31, 2025Updated 4 months ago
- Ansible roles deploying BigBlueButton☆19Aug 25, 2022Updated 3 years ago
- Decomposition into Low-Rank and Sparse Matrices in Computer Vision