This is a paper list about Machine Learning for IDSes
☆91Aug 27, 2024Updated last year
Alternatives and similar repositories for AI-Security
Users that are interested in AI-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- source code for USENIX Security paper xNIDS☆61Aug 27, 2024Updated last year
- IoT Security Reading List☆62Apr 6, 2020Updated 6 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆385Mar 24, 2026Updated last month
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆37Jan 16, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- KitNET is a lightweight online anomaly detection algorithm, which uses an ensemble of autoencoders.☆258Mar 28, 2024Updated 2 years ago
- Learning From Imbalanced Classes☆14Aug 25, 2016Updated 9 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆770May 8, 2019Updated 6 years ago
- ☆270Aug 25, 2018Updated 7 years ago
- Detect HTTP stalling attacks like slowloris with Bro☆19Mar 1, 2018Updated 8 years ago
- implementation of BiGAN model using tensorflow☆16Oct 2, 2018Updated 7 years ago
- [ICFEM2017 / IEEE Transactions on Reliability] Learning Type for Binary / Type Learning for Binaries and its Applications☆15Sep 14, 2018Updated 7 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆146Jan 5, 2019Updated 7 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- I put all my exploration around AI in reproducible notebooks in this repository☆106Feb 11, 2026Updated 2 months ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆298Dec 22, 2023Updated 2 years ago
- RARE for P4Lang bmv2 dataplane target☆30Apr 17, 2026Updated 2 weeks ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆73Mar 25, 2023Updated 3 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆24Oct 16, 2020Updated 5 years ago
- Reconstruct files from QR-code video data☆22Feb 15, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Jun 24, 2017Updated 8 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Jun 10, 2020Updated 5 years ago
- Deep Learning models for network traffic classification☆767Jan 30, 2026Updated 3 months ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Jan 7, 2021Updated 5 years ago
- ☆17Nov 14, 2025Updated 5 months ago
- A protocol reverse engineer tool written in java.☆28Oct 14, 2016Updated 9 years ago
- Collected dataset of DGA domains and Alexa domains. Used for experiments in automatic DGA domains classification.☆20Apr 16, 2022Updated 4 years ago
- helper functions for processing and integrating visual language information with Qwen-VL Series Model☆18Aug 30, 2024Updated last year
- An implementation for a federated learning environment in python using Keras☆24Jul 17, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago
- Reducing P4 Language’s Voluminosity using Higher-Level Constructs☆15Oct 15, 2022Updated 3 years ago
- Documentation, source code, and data links for Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features …☆26Nov 3, 2015Updated 10 years ago
- A code generator for packet-processing pipelines based on end-to-end program synthesis☆12Jan 19, 2022Updated 4 years ago
- ☆14Aug 3, 2020Updated 5 years ago
- Machine Learning For Cybersecurity.☆71Nov 9, 2019Updated 6 years ago
- 10 Machine Learning Blueprints You Should Know for Cybersecurity, published by Packt☆30Apr 22, 2026Updated 2 weeks ago