A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts involved in P2P traffic.
☆12Jan 4, 2023Updated 3 years ago
Alternatives and similar repositories for BotNet-Detection-ML
Users that are interested in BotNet-Detection-ML are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implemented a LightLGM model capable of predicting the closing price movements for hundreds of NASDAQ listed stocks using data from the…☆16Jan 8, 2024Updated 2 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Jan 1, 2015Updated 11 years ago
- A self-hosted cyber attack and network flow visualization on a 3D globe with support for anonymization and NetFlow. Written in Go and Typ…☆19Mar 9, 2025Updated last year
- Blockchain Based E-Voting System on Django Framework☆23Jul 10, 2024Updated last year
- A collection of all questions asked during the various interview processes during IIT-BHU's 2021-22 intern season. Both coding rounds and…☆19Aug 9, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆18May 15, 2025Updated 10 months ago
- A network intrusion detection system using machine learning. Naive Bayes, Decision Tree machine learning algorithm are used in this proje…☆15Dec 12, 2016Updated 9 years ago
- ☆11Dec 30, 2020Updated 5 years ago
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- Machine Learning Based DDoS Detection (HTTP,UDP,TCP and ICMP Flood Attack)☆10Jul 3, 2018Updated 7 years ago
- A generative model for Indian classical music using finite state machines☆14Jan 10, 2021Updated 5 years ago
- The Observatory for Digital Infrastructure & Network Transparency☆43Feb 24, 2026Updated last month
- ☆13Feb 24, 2026Updated last month
- ☆10Nov 11, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The objective of this project is to develop a Monte Carlo simulation model for portfolio optimization to maximise an investor's max retur…☆11Dec 7, 2023Updated 2 years ago
- A centralized hub for all your decentralized needs.☆12Jul 28, 2021Updated 4 years ago
- ML based intrusion detection system☆21Jun 18, 2021Updated 4 years ago
- network visualization of Reddit discussions☆104Aug 8, 2013Updated 12 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- ☆12Jun 27, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Case Studies in Finance: Stock Price Valuation using Black-Scholes using Brownian Motions, Investment Project comparing Stocks and Bonds,…☆19Feb 26, 2021Updated 5 years ago
- Repository for Ludus french templates☆23Mar 1, 2026Updated last month
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- Artificial Intelligence for Cybersecurity, published by Packt☆24Mar 2, 2026Updated last month
- Our project uses state-of-the-art deep learning techniques to tackle a vital medical task: polyp segmentation from colonoscopy images. We…☆13Sep 24, 2023Updated 2 years ago
- Balls bouncing in a ring. This simulation outlines how chaos emerges from a simple ball bouncing around in a ring. This code was inspired…☆22Feb 13, 2024Updated 2 years ago
- Simple Network Intrusion Detection System. In python with Scapy.☆39Jun 10, 2019Updated 6 years ago
- A P2P file sharing system like Bit Torrent implemented using socket programming, multi-threading and SHA1 hashing. Users can share, downl…☆11Oct 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [CVPR 2026] ZoomEarth: Active Perception for Ultra-High-Resolution Geospatial Vision-Language Tasks☆34Updated this week
- 2D Convolutional KAN Layers with different types of activation functions☆12Sep 29, 2024Updated last year
- patch of OpenWrt source to build firmware for the Xiaomi Mi Router 4A Gigabit V2 (RB02/R4AV2)☆13Apr 29, 2023Updated 2 years ago
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Faster and efficient mechvibes.com alternative written in Rust☆23Nov 29, 2024Updated last year
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago