TheAxeC / machine-learning-techniques-for-flow-based-network-intrusion-detection-systemsView on GitHub
[Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine learning approaches
☆41Sep 4, 2016Updated 9 years ago
Alternatives and similar repositories for machine-learning-techniques-for-flow-based-network-intrusion-detection-systems
Users that are interested in machine-learning-techniques-for-flow-based-network-intrusion-detection-systems are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- Final Year project based upon Network Intrusion Detection System☆37Jul 10, 2019Updated 6 years ago
- A HYBRID APPROACH TO ANOMALY DETECTION USING FUZZY LOGIC TUNED WITH EVOLUTIONARY ALGORITHMS☆16Dec 12, 2014Updated 11 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆19Jul 8, 2020Updated 5 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆53Aug 10, 2023Updated 2 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- Extracting data and analyzing the network traffic flow☆13Jul 19, 2018Updated 7 years ago
- A Deep Packet Inspection application that provides encrypted protocol recognition based on Machine Learning☆21Jun 18, 2018Updated 7 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- 【原蚁逅平台1.0】 集在线WEBTOOLS、BLOG以及一款基于socket.io开发的全新XSS平台☆17Mar 6, 2016Updated 10 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Jul 15, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ensemble code for Resnet in Tensorflow slim☆13Nov 16, 2016Updated 9 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆69Oct 15, 2020Updated 5 years ago
- 网络在线流量分析系统☆26Jul 7, 2017Updated 8 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- Playing around with IDS data in Keras☆13Apr 13, 2020Updated 6 years ago
- intrusion detection script in python☆37May 31, 2021Updated 4 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 9 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆46Jun 3, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆25Mar 27, 2017Updated 9 years ago
- ☆84Aug 7, 2013Updated 12 years ago
- SSH traffic analysis☆23Apr 16, 2019Updated 7 years ago
- Linux系统VPS(服务器)性能一键测试脚本☆14Nov 25, 2017Updated 8 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machine…☆60Oct 31, 2025Updated 5 months ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Feb 14, 2023Updated 3 years ago
- Encrypted traffic classification use CNN☆34Dec 7, 2020Updated 5 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆49Jun 13, 2024Updated last year
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- 机器学习应用平台/数据预测/文本分类☆12May 24, 2019Updated 6 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago