☆16May 16, 2022Updated 3 years ago
Alternatives and similar repositories for snort3-plugin-ML
Users that are interested in snort3-plugin-ML are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 6 years ago
- ☆16Sep 12, 2018Updated 7 years ago
- ☆12Oct 16, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆20Sep 24, 2025Updated 6 months ago
- This is a fork of Open vSwitch, we focus DPDK based Open vSwitch☆69Feb 7, 2025Updated last year
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- Based on the CICIDS2017 dataset and Pytorch platform☆29May 8, 2019Updated 6 years ago
- Python module for the qwiic serial control motor driver☆10Mar 19, 2025Updated last year
- A synthetic CPU load generator☆13Dec 23, 2020Updated 5 years ago
- Machine learning based cyber attack detection in network traffic.☆14Dec 14, 2020Updated 5 years ago
- Cost-aware network traffic analysis☆13Dec 20, 2023Updated 2 years ago
- Every Node for Itself: Fully Distributed Service Coordination☆10Nov 8, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Nov 22, 2020Updated 5 years ago
- Vyatta system-level configuration templates/scripts☆39Jul 15, 2025Updated 8 months ago
- ☆12Oct 21, 2020Updated 5 years ago
- DataLLM☆15May 28, 2025Updated 9 months ago
- Jewel: Resource-Efficient Joint Packet and Flow Level Inference in Programmable Switches☆12Mar 18, 2024Updated 2 years ago
- A Throughput-Centric View of the Performance of Datacenter Topologies [SIGCOMM'21]☆10May 25, 2021Updated 4 years ago
- Cycle Accurate Symbolic Timing Analysis of Network Functions☆10Dec 7, 2021Updated 4 years ago
- Machine Learning Inference Graph Spec☆21Jul 27, 2019Updated 6 years ago
- ☆15Aug 6, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CausIL is an approach to estimate the causal graph for a cloud microservice system, where the nodes are the service-specific metrics whil…☆13Jul 3, 2023Updated 2 years ago
- This repository consists of python codes that performs attack classification based on the KDD and CIDDS dataset using CNN, LSTM-RNN and H…☆23Jun 26, 2023Updated 2 years ago
- Repository for the Performance Interface eXtractor (PIX) tool presented at NSDI'22.☆17Jul 14, 2022Updated 3 years ago
- Sources and examples for ASPLOS20 paper☆14Jul 21, 2020Updated 5 years ago
- Learning to log: A framework for determining optimal logging points [ICSE'15, ICSE'14]☆15Dec 25, 2018Updated 7 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Apr 9, 2019Updated 6 years ago
- Implementation of algorithms for memory optimized deep neural network training☆10Jul 23, 2020Updated 5 years ago
- Tool to symbolically execute eBPF programs☆17Mar 5, 2024Updated 2 years ago
- ☆14Dec 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Artifacts Release: A Case for Stateless Mobile Core Network Functions in Space☆16Aug 16, 2022Updated 3 years ago
- A system log management tool with automatically generated log templates.☆13Jul 26, 2024Updated last year
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- Course on Machine Learning for Networks at Télécom SudParis (Institut Polytechnique de Paris)☆16Feb 13, 2026Updated last month
- Example code to create and train a Pytorch model using the new C++ frontend.☆17Mar 19, 2019Updated 7 years ago
- Snort IDS ported to OpenNetVM☆17Apr 17, 2020Updated 5 years ago
- Exploring techniques for estimating safety of machine learning classifiers☆78Feb 21, 2025Updated last year