Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets
☆14Apr 25, 2021Updated 4 years ago
Alternatives and similar repositories for Intrusion_Detection_Using_CICIDS2017
Users that are interested in Intrusion_Detection_Using_CICIDS2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- This repository contains the code and instructions for Arduino, Python, Streamlit, Machine Learning and more stuff!☆12Apr 8, 2024Updated last year
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- A distributed Oracle system for IoT data☆11Apr 12, 2023Updated 2 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆33Apr 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Smart Contracts for decentralized access control for IoT data using Blockchain and trusted oracles☆11Apr 14, 2019Updated 6 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- demo of running rl-based recommender systems locally☆12Jun 11, 2022Updated 3 years ago
- A fully featured platform that detect clothing size and continuously recommends clothing tailored to the user's liking☆10Aug 9, 2023Updated 2 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- This project showcases a big data processing pipeline for cryptocurrency data using Hadoop, Spark Streaming, Kafka, MongoDB, and a React …☆12May 10, 2023Updated 2 years ago
- By using python 3.6 and google recognizer and ffmpeg it will convert video file like mp4 to audio file like mp3 and also convert 3gp file…☆13Jan 30, 2019Updated 7 years ago
- 基于ARM-Linux的嵌入式视觉移动追踪系统,并通过Android APP进行无线控制☆15Jul 31, 2022Updated 3 years ago
- ☆13Oct 28, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- Engineered an advanced deep learning model to automate the classification of financial documents, including Balance Sheets, Cash Flow and…☆10Jul 19, 2024Updated last year
- 基于STM32芯片的简易机械臂源码☆16Sep 14, 2018Updated 7 years ago
- ☆24Aug 8, 2022Updated 3 years ago
- ☆15Dec 7, 2023Updated 2 years ago
- The homework of Web Security☆21Nov 14, 2018Updated 7 years ago
- Genetic Algorithm for Feature Selection☆13Mar 9, 2019Updated 7 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Myntra 'HackerRamp: WeForShe' hackathon's pre-finale submission 'V-Shop' is a communicative web application which will facilitate the use…☆12Jan 17, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆21May 8, 2019Updated 6 years ago
- A hands-free tool for watching video and doing homework&exam faster | 一款快速完成视频观看、小测及考试的解放双手工具☆13Jun 21, 2019Updated 6 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- about 5G doc and code☆11Jun 14, 2019Updated 6 years ago
- ☆11May 14, 2020Updated 5 years ago
- A tool to convert tabular data into images, in order to be used by CNNs Inspired by the "DeepInsight" paper.☆27Jan 2, 2025Updated last year
- 基于Hadoop对豆瓣电影的分析☆17Aug 17, 2020Updated 5 years ago
- Simulate Rayleigh fading channel by Filtered Gaussian Noise Method and Sum of Sinusoids Methods☆22Nov 23, 2017Updated 8 years ago
- Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated…☆24Oct 16, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 基于STM32的车牌识别系统☆14Mar 16, 2018Updated 8 years ago
- Detect and report Obscene contents on the Internet directly from your browser with Deep-Learning models.☆12Jul 13, 2023Updated 2 years ago
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- Multi-label feature selection using Ant colony optimization☆16Jun 28, 2021Updated 4 years ago
- This project aims to identify and classify the anomalies captured in network traffic using different machine learning strategies. After t…☆13Jul 14, 2022Updated 3 years ago
- ☆13Apr 6, 2023Updated 2 years ago
- ☆12Oct 8, 2022Updated 3 years ago