c2dc / AB-TRAP
This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model realization, and performance evaluation.
☆51Updated 3 years ago
Alternatives and similar repositories for AB-TRAP
Users that are interested in AB-TRAP are comparing it to the libraries listed below
Sorting:
- ☆63Updated 5 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆38Updated 10 months ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆17Updated 2 years ago
- Machine Learning in Cybersecurity☆82Updated 7 months ago
- Network Intrusion Detection System using Deep Learning Techniques☆155Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 4 years ago
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆45Updated 10 months ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆60Updated last year
- IoT Attack Detection with machine learning☆27Updated 10 months ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆83Updated 4 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆69Updated 2 years ago
- ☆24Updated 11 months ago
- AI-enabled Cybersecurity for Future Smart Environments☆24Updated 9 months ago
- CICIDS2017 dataset☆69Updated 3 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆104Updated 5 years ago
- Implementation of Robust Transformer Based Intrusion Detection, based on the Paper by Wu et. Al☆22Updated 8 months ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆179Updated last year
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆36Updated 2 months ago
- Coburg Intrusion Detection Data Sets☆50Updated 7 years ago
- ☆48Updated 3 years ago
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆40Updated 4 years ago
- The main goal of this research is to derive the challenges in intrusion based cyber security systems and providing the solutions using cu…☆14Updated 4 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆68Updated 6 years ago
- Code for our submission to IEEE CNS 2022☆17Updated last year
- ☆82Updated last year
- Generative adversarial networks for Network Intrusion Benchmark datasets☆35Updated 9 months ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆67Updated last month
- A machine learning based Intrusion Detection System☆135Updated 5 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆206Updated last year