This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model realization, and performance evaluation.
☆58Dec 30, 2025Updated 2 months ago
Alternatives and similar repositories for AB-TRAP
Users that are interested in AB-TRAP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆31Jan 8, 2026Updated 2 months ago
- ☆10Jun 22, 2025Updated 9 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- ☆11Dec 16, 2021Updated 4 years ago
- ☆19Nov 21, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆20Nov 1, 2024Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- Cobalt Strike random C2 Profile generator☆16Mar 4, 2026Updated 3 weeks ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆223Apr 25, 2024Updated last year
- ☆18May 9, 2024Updated last year
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆28Oct 21, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- ☆24Aug 8, 2022Updated 3 years ago
- Journal Article: IEEE Access☆20Oct 23, 2023Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆103Jun 30, 2022Updated 3 years ago
- Code for paper: Contrastive Learning Enhanced Intrusion Detection☆18Apr 18, 2023Updated 2 years ago
- ☆24Aug 7, 2023Updated 2 years ago
- IoT-Flock is an open-source tool for IoT Traffic Generation which supports the two widely used IoT Application Layer Protocols, i.e., MQT…☆31Mar 5, 2020Updated 6 years ago
- On Robustness of Neural Ordinary Differential Equations☆11Oct 12, 2021Updated 4 years ago
- Code for our submission to IEEE CNS 2022☆24Oct 10, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Traffic state data imputation☆11Aug 14, 2022Updated 3 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆89Dec 27, 2023Updated 2 years ago
- Netgpt: Generative pretrained transformer for network traffic☆32Jan 10, 2025Updated last year
- This gym environment simulates network intrusion similar to that described in the NSL-KDD Dataset given in this link http://www.unb.ca/ci…☆14Feb 15, 2018Updated 8 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- ☆10Jan 4, 2024Updated 2 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- tcbench is a Machine Learning and Deep Learning framework to train model from traffic packet time series or other input representations.☆32Dec 20, 2024Updated last year
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆38Jan 10, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆42Apr 17, 2025Updated 11 months ago
- 利用MapReduce对海量微博数据进行排序,并找出top10的Topic☆12Sep 25, 2024Updated last year
- Fence GAN: Towards Better Anomaly Detection☆40Apr 20, 2021Updated 4 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Jun 29, 2022Updated 3 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated 11 months ago