AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic using Autoencoder.
☆14Mar 18, 2020Updated 6 years ago
Alternatives and similar repositories for aeids-py
Users that are interested in aeids-py are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- An OpenFlow application for resilient multicast☆12Mar 30, 2017Updated 9 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆42Jul 17, 2020Updated 5 years ago
- A Deep Packet Inspection application that provides encrypted protocol recognition based on Machine Learning☆21Jun 18, 2018Updated 7 years ago
- ICDM19 - Anomaly Detection / Outlier Detection for Mixed data☆14Dec 6, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10May 10, 2018Updated 7 years ago
- An Ryu Application implemented NAT☆22Jun 22, 2017Updated 8 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- GAN / AUTOENCODER for network intrusion detection using NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd☆19Apr 25, 2023Updated 3 years ago
- Snowkylin's Blog - 雪麒的百草园☆14Nov 26, 2025Updated 5 months ago
- ☆16Oct 23, 2019Updated 6 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- A research & development project to create and deploy a Network-based Intrusion Detection System (IDS) to detect intruders on a distribut…☆12Jan 9, 2019Updated 7 years ago
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago
- Getting Started with Aether☆11Aug 3, 2023Updated 2 years ago
- LEO Satellite vs. Cellular Networks: Exploring the Potential for Synergistic Integration (CoNEXT '23)☆11Oct 26, 2023Updated 2 years ago
- Adversarial Structure Matching for Structured Prediction Tasks☆11Jun 4, 2024Updated last year
- Examples of Generative Adversarial Networks built using torchgan☆12Jun 11, 2019Updated 6 years ago
- The bare necessities of Pandas on the Weld runtime☆14Dec 26, 2022Updated 3 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- Learning Backtracking Models, ICLR'19☆10Feb 2, 2018Updated 8 years ago
- Intrusion Detection System - IDS example using Dense, Conv1d and Lstm layers in Keras / TensorFlow☆25Apr 28, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Networking IDS , network traffic classification with ML. Final Project for ECE-417.☆14Jan 21, 2020Updated 6 years ago
- Analyzes traffic via netflow or live capture and graphs ASN's☆20Sep 26, 2023Updated 2 years ago
- Code and data for paper AspEm: Embedding Learning by Aspects in Heterogeneous Information Networks☆26May 2, 2018Updated 8 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- A PyTorch implementation of Temporal Generative Adversarial Nets with Singular Value Clipping☆11Nov 22, 2017Updated 8 years ago
- BFlows is a SDN-based traffic schduling application.☆17Sep 20, 2023Updated 2 years ago
- Extracting data and analyzing the network traffic flow☆13Jul 19, 2018Updated 7 years ago
- The project is to recognize spoofing attack of faces using a normal flat camera without any extra sensors (such as depth, IR).☆10Jul 25, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Generative Adversarial Network for Shakuhachi Music☆14Jul 2, 2019Updated 6 years ago
- Intrusion detection system using CNN and RNN☆26Sep 23, 2019Updated 6 years ago
- Android malware classification using both .java files and .so files☆11Jan 19, 2019Updated 7 years ago
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- SDN for Intra-Vehicular Networks☆10May 25, 2021Updated 4 years ago
- Final Project for Udacity Machine Learning Course☆21Feb 5, 2016Updated 10 years ago
- PyTorch implementation of the ICML 2020 paper "Latent Bernoulli Autoencoder"☆25Apr 8, 2021Updated 5 years ago