c2dc / AB-TRAPLinks
This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model realization, and performance evaluation.
☆53Updated 3 years ago
Alternatives and similar repositories for AB-TRAP
Users that are interested in AB-TRAP are comparing it to the libraries listed below
Sorting:
- Machine Learning in Cybersecurity☆86Updated 2 months ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆40Updated last year
- Public datasets to help you address various cyber security problems.☆444Updated 3 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆208Updated last year
- Network Intrusion Detection System using Deep Learning Techniques☆157Updated 5 years ago
- A machine learning based Intrusion Detection System☆142Updated 5 years ago
- ☆68Updated last month
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆70Updated 6 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆73Updated last year
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 4 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆135Updated 3 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆86Updated 4 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆343Updated last year
- IoT Attack Detection with machine learning☆27Updated last month
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆226Updated 2 years ago
- CTU13 CSV Dataset contains Botnet, Normal and Background traffic☆16Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆64Updated 4 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆42Updated this week
- This forked repository contains our fixed version of the original CICFlowmeter tool. The improvements were implemented as part of our pap…☆47Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆183Updated 2 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆70Updated 2 years ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆74Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆156Updated 2 years ago
- DDoS attack analysis using Machine Learning☆44Updated 4 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆281Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆26Updated 3 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆186Updated last year