A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".
☆39May 5, 2017Updated 8 years ago
Alternatives and similar repositories for ITKST42-network-data-classifier
Users that are interested in ITKST42-network-data-classifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoT intrusion Detection Model based on neural network and random forests☆49Oct 16, 2018Updated 7 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆76Oct 20, 2020Updated 5 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆91Sep 19, 2020Updated 5 years ago
- Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)☆19Jul 9, 2019Updated 6 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆27Sep 25, 2020Updated 5 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- Final Year project based upon Network Intrusion Detection System☆37Jul 10, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆203Sep 8, 2021Updated 4 years ago
- Implementation for paper "Link Prediction on Heterophilic Graphs via Disentangled Representation Learning"☆13Aug 26, 2022Updated 3 years ago
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- Normalized network traffic entropy-based DDoS detection in P4☆13May 9, 2024Updated last year
- The Pytorch implemetation of "FeatWalk: Enhancing Few-Shot Classification through Local View Leveraging", AAAI 2024.☆11Mar 4, 2024Updated 2 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- This clustering based anomaly detection project implements unsupervised clustering algorithms on the NSL-KDD and IDS 2017 datasets☆58Dec 5, 2019Updated 6 years ago
- learn to allocate wireless resources with GNN in over-the-air FL system☆10Jun 4, 2023Updated 2 years ago
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆55Apr 9, 2019Updated 7 years ago
- Anomaly detection in industrial IoT sensors (Collecting data for predictive maintenance)☆11Mar 3, 2020Updated 6 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆225Apr 25, 2024Updated last year
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆13Apr 22, 2021Updated 4 years ago
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆46Jun 3, 2019Updated 6 years ago
- CV and Deep Learning methods to analyze the data from Traffic Camera☆13Sep 29, 2018Updated 7 years ago
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- Cross-site-scripting attacks: A Comprehensive dataset for AI techniques usage☆21Apr 15, 2022Updated 3 years ago
- Full pipeline for log analysis and anomaly detection.☆18Feb 11, 2020Updated 6 years ago
- This project contains datasets for Cross Site Scripting (XSS), SQL, and LDAP injections. The project also contains the Matlab code for cr…☆19Dec 18, 2020Updated 5 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆81May 25, 2023Updated 2 years ago