Solutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
☆59Apr 1, 2017Updated 9 years ago
Alternatives and similar repositories for kdd99-scikit
Users that are interested in kdd99-scikit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- using machine-learning to detecte instruction☆29Oct 21, 2019Updated 6 years ago
- Use Introduction☆21Aug 4, 2019Updated 6 years ago
- cnn_1D for kdd99☆21Nov 7, 2018Updated 7 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆94Oct 18, 2019Updated 6 years ago
- Intrusion Detection Based on Convolutional Neural Network with kdd99 data set☆58May 15, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆765May 8, 2019Updated 6 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆89Dec 27, 2023Updated 2 years ago
- PySpark solution to the KDDCup99☆100Jun 20, 2016Updated 9 years ago
- Utility for extraction of subset of KDD '99 features from realtime network traffic or .pcap file☆120Mar 21, 2020Updated 6 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆76Oct 20, 2020Updated 5 years ago
- ☆10Dec 8, 2023Updated 2 years ago
- This project is focus on stock prediction,our goal is implementing one trading framework using DRL with LSTM.☆11Jun 1, 2018Updated 7 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆89Jan 24, 2018Updated 8 years ago
- ☆16Jul 8, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year
- Application Layer DDoS attack detection using fast entropy computation method☆13May 18, 2024Updated last year
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Jul 18, 2018Updated 7 years ago
- Experiment code☆10Sep 17, 2018Updated 7 years ago
- A Mail client written in Qt5 and Poco Library, supports send(SMTP) / receive(IMAP) mails and attachments. 基于Qt5和Poco的Windows邮件客户端, 支持SMTP…☆13Dec 18, 2016Updated 9 years ago
- 学习笔记☆18Oct 19, 2019Updated 6 years ago
- All exercises from private AI Facebook Scholarship☆13Jul 21, 2019Updated 6 years ago
- Solidity Code for the RBAC-SC smart contract☆18Aug 26, 2021Updated 4 years ago
- Scripts to help to detect anomalies in pcap file. Anomaly Detection using tensorflow and tshark.☆83Mar 1, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- IoT device Simulation using Kubernetes, with StatefulSets, Secrets, ConfigMap and .Net Core☆15Aug 31, 2018Updated 7 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆14Dec 21, 2018Updated 7 years ago
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆55Apr 9, 2019Updated 7 years ago
- Read and process pcap files using this nifty tool☆43Dec 21, 2018Updated 7 years ago
- PHP Simple BBS based on yii.☆37Mar 11, 2020Updated 6 years ago
- Official code for Fisher information embedding for node and graph learning (ICML 2023)☆19Jun 17, 2023Updated 2 years ago
- ☆12Apr 6, 2023Updated 3 years ago
- 基于机器学习的恶意代码检测☆13Apr 2, 2019Updated 7 years ago
- A simple federated learning implementation on MNIST dataset using PySyft. Main goal of the project was to get used to the PySyft federate…☆13Apr 19, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- demonstrate pso-svm in python☆17Aug 14, 2019Updated 6 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- Passive OS Fingerprinting Tool (mirror of defunct site)☆30Apr 7, 2010Updated 16 years ago