Intrusion Detection System - IDS example using Dense, Conv1d and Lstm layers in Keras / TensorFlow
☆25Apr 28, 2023Updated 2 years ago
Alternatives and similar repositories for deep_learn_ids
Users that are interested in deep_learn_ids are comparing it to the libraries listed below
Sorting:
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆39Aug 8, 2020Updated 5 years ago
- 基于机器学习的DDoS入侵检测算法☆14Mar 14, 2022Updated 4 years ago
- Federated Learning for Intrusion Detection System using the Flower framework and UNSW_NB15 dataset.☆30Jan 13, 2024Updated 2 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 2 years ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- Created Network Intrusion Detection System using Pytorch☆15Oct 15, 2020Updated 5 years ago
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- A GRU deep learning system against attacks in Software Defined Networks (SDN).☆34Apr 19, 2024Updated last year
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- 使用卷积神经网络进行网络入侵检测,正确率可达99.5%☆197Jun 2, 2019Updated 6 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- learn to allocate wireless resources with GNN in over-the-air FL system☆10Jun 4, 2023Updated 2 years ago
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Jan 9, 2025Updated last year
- Journal Article: IEEE Access☆20Oct 23, 2023Updated 2 years ago
- 机器学习作业,机器学习和深度学习方法实现入侵检测☆36Apr 19, 2022Updated 3 years ago
- Intrusion detection engine for Cloud Systems built using Alternative Fuzzy C-mean Clustering and Artificial Neural Network☆19May 8, 2018Updated 7 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆173Dec 15, 2019Updated 6 years ago
- Intrusion Detection System using Machine Learning and Ensemble Techniques☆20May 14, 2021Updated 4 years ago
- Code for ICASSP 2024 paper "Unravel Anomalies: An End-to-end Seasonal-Trend Decomposition Approach for Time Series Anomaly Detection".☆16Apr 18, 2024Updated last year
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆199Apr 21, 2023Updated 2 years ago
- SIGIR 2022: Privacy-Preserving Synthetic Data Generation for Recommendation Systems☆11Nov 17, 2022Updated 3 years ago
- 社工库demo☆12May 24, 2021Updated 4 years ago
- ☆36Jan 25, 2024Updated 2 years ago
- The source code of the paper "Compressed Federated Learning Based on Adaptive Local Differential Privacy".☆10Oct 23, 2023Updated 2 years ago
- ☆12Jun 27, 2024Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- Causing a DDOS attack and mitigating it using blockchain and smart contracts.☆13Apr 26, 2018Updated 7 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆89Dec 27, 2023Updated 2 years ago
- Atomic exchange of Cashu payments for Nostr event signatures using Schnorr adaptor signatures☆18Apr 4, 2025Updated 11 months ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- ☆21Feb 11, 2025Updated last year
- Federated learning + blockchain example☆12Sep 13, 2022Updated 3 years ago
- Machine Learning in Cybersecurity☆91May 23, 2025Updated 9 months ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆81Jun 9, 2025Updated 9 months ago