Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm
☆91Sep 19, 2020Updated 5 years ago
Alternatives and similar repositories for IDS-UNSW-NB15
Users that are interested in IDS-UNSW-NB15 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆203Sep 8, 2021Updated 4 years ago
- IoT intrusion Detection Model based on neural network and random forests☆50Oct 16, 2018Updated 7 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆77Oct 20, 2020Updated 5 years ago
- Building an Intrusion detection system using KDD Cup 99 Dataset☆15May 11, 2020Updated 5 years ago
- A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".☆39May 5, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Binary Classification for detecting intrusion network attacks. In order, to emphasize how a network packet with certain features may have…☆29Dec 19, 2021Updated 4 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 6 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆225Apr 25, 2024Updated 2 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆771May 8, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆14Jul 10, 2024Updated last year
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆14Aug 24, 2019Updated 6 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- A machine learning based Intrusion Detection System☆172Dec 11, 2019Updated 6 years ago
- RNN-based IDS for SOME/IP Intrusion Detection☆10Jul 20, 2021Updated 4 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- Federated Learning for Intrusion Detection System using the Flower framework and UNSW_NB15 dataset.☆34Jan 13, 2024Updated 2 years ago
- ☆43Dec 26, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Autoencoder approach to detect attacks/intrusions in a network☆10Mar 25, 2023Updated 3 years ago
- Malware🦠 Detection and Analysis using Machine Learning (MDAML) is designed to provide users with an intuitive interface for analyzing an…☆44Feb 4, 2026Updated 3 months ago
- This repo is about Vehicle Price Prediction using machine learning and web app created using flask server andalso deployed on heroku☆11Mar 20, 2021Updated 5 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆25Aug 7, 2024Updated last year
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- A Snort 3 Machine Learning-based Inspector for Bidirectional Network Flow Classification.☆19Mar 22, 2020Updated 6 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Jul 15, 2023Updated 2 years ago
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆37Mar 3, 2023Updated 3 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆27Jan 6, 2020Updated 6 years ago
- Basic Machine learning projects and assignments done by me.☆34Aug 12, 2020Updated 5 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 7 months ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆37May 6, 2021Updated 5 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆80Apr 3, 2021Updated 5 years ago