A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts involved in P2P traffic.
☆12Jan 4, 2023Updated 3 years ago
Alternatives and similar repositories for BotNet-Detection-ML
Users that are interested in BotNet-Detection-ML are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implemented a LightLGM model capable of predicting the closing price movements for hundreds of NASDAQ listed stocks using data from the…☆16Jan 8, 2024Updated 2 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Jan 1, 2015Updated 11 years ago
- A self-hosted cyber attack and network flow visualization on a 3D globe with support for anonymization and NetFlow. Written in Go and Typ…☆19Mar 9, 2025Updated last year
- Blockchain Based E-Voting System on Django Framework☆22Jul 10, 2024Updated last year
- A collection of all questions asked during the various interview processes during IIT-BHU's 2021-22 intern season. Both coding rounds and…☆19Aug 9, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆18May 15, 2025Updated 10 months ago
- A network intrusion detection system using machine learning. Naive Bayes, Decision Tree machine learning algorithm are used in this proje…☆15Dec 12, 2016Updated 9 years ago
- The Observatory for Digital Infrastructure & Network Transparency☆37Feb 24, 2026Updated last month
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- Machine Learning Based DDoS Detection (HTTP,UDP,TCP and ICMP Flood Attack)☆10Jul 3, 2018Updated 7 years ago
- A generative model for Indian classical music using finite state machines☆14Jan 10, 2021Updated 5 years ago
- ☆13Feb 24, 2026Updated last month
- ☆10Nov 11, 2016Updated 9 years ago
- The objective of this project is to develop a Monte Carlo simulation model for portfolio optimization to maximise an investor's max retur…☆11Dec 7, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A centralized hub for all your decentralized needs.☆12Jul 28, 2021Updated 4 years ago
- network visualization of Reddit discussions☆104Aug 8, 2013Updated 12 years ago
- ML based intrusion detection system☆21Jun 18, 2021Updated 4 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Artificial Intelligence for Cybersecurity, published by Packt☆24Mar 2, 2026Updated 3 weeks ago
- ☆12Jun 27, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Case Studies in Finance: Stock Price Valuation using Black-Scholes using Brownian Motions, Investment Project comparing Stocks and Bonds,…☆19Feb 26, 2021Updated 5 years ago
- Repository for Ludus french templates☆23Mar 1, 2026Updated 3 weeks ago
- [CVPR 2026] ZoomEarth: Active Perception for Ultra-High-Resolution Geospatial Vision-Language Tasks☆32Mar 10, 2026Updated 2 weeks ago
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- Our project uses state-of-the-art deep learning techniques to tackle a vital medical task: polyp segmentation from colonoscopy images. We…☆11Sep 24, 2023Updated 2 years ago
- Balls bouncing in a ring. This simulation outlines how chaos emerges from a simple ball bouncing around in a ring. This code was inspired…☆22Feb 13, 2024Updated 2 years ago
- Simple Network Intrusion Detection System. In python with Scapy.☆39Jun 10, 2019Updated 6 years ago
- A P2P file sharing system like Bit Torrent implemented using socket programming, multi-threading and SHA1 hashing. Users can share, downl…☆11Oct 28, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Agentic Architectural Patterns for Building Multi-Agent Systems, published by Packt☆55Mar 2, 2026Updated 3 weeks ago
- patch of OpenWrt source to build firmware for the Xiaomi Mi Router 4A Gigabit V2 (RB02/R4AV2)☆13Apr 29, 2023Updated 2 years ago
- 2D Convolutional KAN Layers with different types of activation functions☆12Sep 29, 2024Updated last year
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Faster and efficient mechvibes.com alternative written in Rust☆23Nov 29, 2024Updated last year
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago