arjunbahuguna / nsl-kddView external linksLinks
Network Security Analysis using Machine Learning on the NSL-KDD dataset from the KDD Cup 1999
☆21Nov 3, 2019Updated 6 years ago
Alternatives and similar repositories for nsl-kdd
Users that are interested in nsl-kdd are comparing it to the libraries listed below
Sorting:
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26May 8, 2020Updated 5 years ago
- NSL-KDD Dataset☆201Jul 30, 2015Updated 10 years ago
- Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { l…☆21Oct 16, 2021Updated 4 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 6 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆28Jan 6, 2020Updated 6 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆219Apr 25, 2024Updated last year
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 2 years ago
- Locally Linear Embedding for Regression - Journal of Chemometrics 2015☆11Aug 5, 2015Updated 10 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- An implementation of the Freeman(Three-Component Scattering) Algorithm for Polarimetric SAR Data☆15Jul 27, 2019Updated 6 years ago
- A shell script to automate the operations of sqoop☆11Mar 29, 2021Updated 4 years ago
- An Intrusion Detection System based on Deep Belief Networks☆90Oct 27, 2022Updated 3 years ago
- ☆48Aug 7, 2022Updated 3 years ago
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- Real-time streaming data pipeline for Twitter Tweets☆10Jan 31, 2022Updated 4 years ago
- ☆11Sep 19, 2025Updated 4 months ago
- 北京市预约挂号统一平台挂号小助手☆11Sep 5, 2019Updated 6 years ago
- Enhanced sound event localization and detection in real 360-degree audio-visual soundscapes (DCASE task3 format)☆12Mar 21, 2025Updated 10 months ago
- Audio-Driven Drum Synthesizer☆15Aug 22, 2025Updated 5 months ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- Text Classification Models - CNN, RCNN, RNN-ATTN [PyTorch]☆11Oct 13, 2020Updated 5 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆10Oct 1, 2019Updated 6 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- Machine Learning Based DDoS Detection (HTTP,UDP,TCP and ICMP Flood Attack)☆10Jul 3, 2018Updated 7 years ago
- A project to design a fact and dimension star schema for optimizing queries on a flight booking database using PostgreSQL, a relational d…☆11Aug 15, 2021Updated 4 years ago
- Data generator for stereo sound event localization and detection task of DCASE 2025 challenge☆14Jul 17, 2025Updated 6 months ago
- ☆10Nov 24, 2018Updated 7 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- ☆12Feb 11, 2021Updated 5 years ago
- Using Bayesian inference to mine rule sets☆12Jan 9, 2020Updated 6 years ago
- ☆17Apr 8, 2024Updated last year
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year