PoCInnovation / SharkticonLinks
Sharkticon is an anomaly detection system, it analyzes your network using a Transformers model adapted to the anomaly detection.
☆23Updated 2 years ago
Alternatives and similar repositories for Sharkticon
Users that are interested in Sharkticon are comparing it to the libraries listed below
Sorting:
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆48Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆47Updated 2 years ago
- Deep learning models for network intrusion detection☆40Updated 2 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated last year
- Attention Model for Network Intrusion Detection☆18Updated 6 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆23Updated 3 years ago
- CICIDS2017 dataset☆70Updated 3 years ago
- A research project of anomaly detection on dataset IoT-23☆100Updated last year
- Generative adversarial networks for Network Intrusion Benchmark datasets☆39Updated last year
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 5 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 6 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆176Updated 4 years ago
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆47Updated last year
- ☆47Updated 3 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆37Updated 5 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆87Updated 5 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Updated 3 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Updated 2 years ago
- ☆88Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆87Updated 2 years ago
- Machine Learning in Cybersecurity☆86Updated 4 months ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆27Updated 5 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆88Updated last year
- ramyaelineni5 / ML-based-Network-Intrusion-Detection-using-Cyber-Dataset-CSE-CIC-IDS2018-to-classify-network-attacks☆43Updated 4 years ago
- manojkumar-github / Intrusion-Detection-System-for-IoT-networks-using-Gated-Recurrent-Neural-Networks-GRUAn Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Updated 7 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆23Updated 4 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆74Updated 5 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 3 years ago