abhinav-bhardwaj / Network-Intrusion-Detection-Using-Machine-Learning
A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach
☆122Updated 3 years ago
Alternatives and similar repositories for Network-Intrusion-Detection-Using-Machine-Learning:
Users that are interested in Network-Intrusion-Detection-Using-Machine-Learning are comparing it to the libraries listed below
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆151Updated 3 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆266Updated last year
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆75Updated 4 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆149Updated 5 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆85Updated 5 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆249Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆25Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆200Updated 8 months ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆100Updated 7 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆91Updated 5 years ago
- Machine Learning and Deep Learning models for Anomaly Detection☆9Updated 5 years ago
- Machine Learning in Cybersecurity☆73Updated 3 months ago
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆91Updated 2 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Updated 6 years ago
- IoT intrusion Detection Model based on neural network and random forests☆44Updated 6 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆100Updated 4 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 5 years ago
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Updated 3 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆41Updated last year
- Baseline experiments on training a Decision Tree Classifier and a Random Forest Classifier using Grid Search with Cross Validation on the…☆43Updated 2 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆83Updated last year
- Deep learning models for network intrusion detection☆33Updated last year
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆205Updated 2 years ago
- Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machine…☆16Updated last month
- A machine learning based Intrusion Detection System☆128Updated 5 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆12Updated 4 years ago
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆21Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆58Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆64Updated 3 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆19Updated 3 years ago