IDS abnormal traffic detection tensorflow
☆44Jul 25, 2019Updated 6 years ago
Alternatives and similar repositories for abnormal-traffic
Users that are interested in abnormal-traffic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 3 years ago
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆55Apr 9, 2019Updated 7 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆298Dec 22, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Network System Intrusion Detection using Graph Neural Networks☆22Aug 1, 2023Updated 2 years ago
- [ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection☆174Mar 24, 2023Updated 3 years ago
- ☆15Mar 24, 2023Updated 3 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆124Oct 25, 2022Updated 3 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- ☆48Aug 7, 2022Updated 3 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- An online learning method used to address concept drift and model drift. Code for the paper entitled "A Lightweight Concept Drift Detecti…☆55Jan 20, 2024Updated 2 years ago
- 前端基于 Vue2.x+ElementUI实现页面布局,后端基于Node.js+Koa2实现接口封装,数据库基于MongoDB实现数据存储,实现一个简单的前后端分离的后台管理系统,涵盖字典管理、菜单管理、用户管理、日志管理、角色授权等基本功能,对于纯前端的开发者独立实现全栈…☆11Jun 7, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆771May 8, 2019Updated 6 years ago
- ☆10Mar 10, 2019Updated 7 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Nessus中文报告自动化脚本☆12Apr 19, 2020Updated 6 years ago
- Nessus REST API 封装☆14Feb 18, 2022Updated 4 years ago
- This repository contains PyTorch implementation of the paper ''LFighter: Defending against Label-flipping Attacks in Federated Learning''…☆19Mar 6, 2026Updated 2 months ago
- 此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu☆15Feb 6, 2023Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆146Mar 25, 2023Updated 3 years ago
- This is a classification task based on CIFAR10,Accuracy is about 87%(without pre-training),The net is CoAtNet(0-5,total coatnet family),w…☆10Oct 1, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Oct 22, 2018Updated 7 years ago
- Automated Analysis of Privacy Policies☆14Jul 27, 2020Updated 5 years ago
- ☆14Sep 8, 2023Updated 2 years ago
- Deep Learning models for network traffic classification☆767Jan 30, 2026Updated 3 months ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆120Jan 10, 2024Updated 2 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 8 years ago
- This repository contains the code used and developed during a master thesis at DTU Compute in 2018☆43Jun 23, 2018Updated 7 years ago
- Toolkit for processing PCAP file and transform into image of MNIST dataset☆262Jan 4, 2024Updated 2 years ago
- ☆152Mar 30, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Traffic dataset USTC-TFC2016☆174Jun 21, 2019Updated 6 years ago
- AI-IDS software for Splunk☆21Apr 8, 2020Updated 6 years ago
- Zigbee receiver for SDR devices with GNU Radio☆12Mar 26, 2021Updated 5 years ago
- 自己的个人毕设,联邦学习相关,主要是多方安全计算中秘密分享的一种算法实现,以完成不需要第三方的安全隐私传输。(An algorithm implementation of secret sharing in multi-party secure computing to c…☆19Apr 10, 2022Updated 4 years ago
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 4 years ago
- ☆20Jan 26, 2025Updated last year
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 5 years ago