Network Security Analysis using Machine Learning on the NSL-KDD dataset from the KDD Cup 1999
☆21Nov 3, 2019Updated 6 years ago
Alternatives and similar repositories for nsl-kdd
Users that are interested in nsl-kdd are comparing it to the libraries listed below
Sorting:
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- A study on Deep Learning and Graph Neural Network for Intrusion Detection and Prevention (CNN, VAE, GNN,...)☆15Jan 16, 2023Updated 3 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- NSL-KDD Dataset☆201Jul 30, 2015Updated 10 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Using keras and tensorflow as backend to generate poems based on poets.☆21Mar 29, 2017Updated 8 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- Using NSL_KDD data☆28Mar 3, 2019Updated 7 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆221Apr 25, 2024Updated last year
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆38Apr 21, 2023Updated 2 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 2 years ago
- Locally Linear Embedding for Regression - Journal of Chemometrics 2015☆11Aug 5, 2015Updated 10 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆270Apr 5, 2020Updated 5 years ago
- 北京市预约挂号统一平台挂号小助手☆11Sep 5, 2019Updated 6 years ago
- Audio-Driven Drum Synthesizer☆15Aug 22, 2025Updated 6 months ago
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- HUD for CI activity on `pytorch/pytorch`, provides a top level view for jobs to easily discern regressions☆13Feb 26, 2022Updated 4 years ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- Enhanced sound event localization and detection in real 360-degree audio-visual soundscapes (DCASE task3 format)☆13Mar 21, 2025Updated 11 months ago
- Machine Learning Based DDoS Detection (HTTP,UDP,TCP and ICMP Flood Attack)☆10Jul 3, 2018Updated 7 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Data generator for stereo sound event localization and detection task of DCASE 2025 challenge☆14Jul 17, 2025Updated 7 months ago
- ☆11Jul 21, 2023Updated 2 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- ☆14Oct 24, 2023Updated 2 years ago
- ☆11Aug 20, 2023Updated 2 years ago
- Using Bayesian inference to mine rule sets☆12Jan 9, 2020Updated 6 years ago
- This repo supports integrating LLMs and communication algorithms with MARL using SMAC as the platform. It provides an end-to-end workflow…☆16Mar 8, 2025Updated last year
- 仿豆瓣电影的app☆10Mar 11, 2018Updated 7 years ago