c2dc / AB-TRAPLinks
This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model realization, and performance evaluation.
☆52Updated 3 years ago
Alternatives and similar repositories for AB-TRAP
Users that are interested in AB-TRAP are comparing it to the libraries listed below
Sorting:
- ☆68Updated 3 weeks ago
- Public datasets to help you address various cyber security problems.☆437Updated 3 years ago
- Machine Learning in Cybersecurity☆84Updated last month
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆39Updated last year
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆72Updated last year
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆207Updated last year
- IoT Attack Detection with machine learning☆27Updated last month
- A machine learning based Intrusion Detection System☆142Updated 5 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆156Updated 5 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆63Updated 4 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆16Updated 2 years ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆73Updated 4 years ago
- A Behavior-Based Device Identification Method for the IoT☆56Updated 4 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- DDoS attack analysis using Machine Learning☆44Updated 4 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆186Updated last year
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆134Updated 3 years ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆21Updated 4 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆40Updated 2 weeks ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆85Updated 4 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆184Updated 2 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 11 months ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆225Updated 2 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆67Updated 2 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆46Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆153Updated 2 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆25Updated 5 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 7 years ago