Using RL for anomaly detection in NSL-KDD
☆123Mar 25, 2023Updated 2 years ago
Alternatives and similar repositories for Anomaly-ReactionRL
Users that are interested in Anomaly-ReactionRL are comparing it to the libraries listed below
Sorting:
- Reinforcement Learning for Anomaly Detection☆46Feb 25, 2018Updated 8 years ago
- This repository contains an implementation of an anomaly detection method called DPLAN, which is based on the reinforcement learning fram…☆12Jan 8, 2024Updated 2 years ago
- Paper Implementation☆27Jun 15, 2024Updated last year
- Deep Reinforcement One-Shot Learning Framework for Artificially Intelligent Classification Systems☆36Apr 30, 2020Updated 5 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆270Apr 5, 2020Updated 5 years ago
- Code for the paper: "Supervised contrastive learning over prototype-label embeddings for network intrusion detection"☆15Jun 7, 2021Updated 4 years ago
- [ICDM 2020] Meta-AAD: Active Anomaly Detection with Deep Reinforcement Learning☆56Mar 20, 2023Updated 2 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- 💳 Creates a new gym environment for credit-card anomaly detection using Deep Q-Networks (DQN) and leverages Open AI's Gym toolkit to all…☆19Nov 1, 2020Updated 5 years ago
- An online learning method used to address concept drift and model drift. Code for the paper entitled "A Lightweight Concept Drift Detecti…☆55Jan 20, 2024Updated 2 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Encrypted Traffic classification☆17Jan 5, 2020Updated 6 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- ☆21Sep 21, 2020Updated 5 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- ☆11Apr 4, 2022Updated 3 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Implement a VAE to learn a reduced state space representation from the NSL-KDD dataset, capturing essential features of normal network t…☆14Feb 15, 2024Updated 2 years ago
- Here we try to detect the attack at it's first attempt using machine learning algorithms(Reinforcement l)☆11Apr 27, 2020Updated 5 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- uPU, nnPU and PN learning with Extra Trees classifier.☆18Dec 2, 2024Updated last year
- demonstrating use of convolution neural networks to detect objects in a video☆17Mar 9, 2017Updated 8 years ago
- Statistical/Machine Learning using Randomized and Quasi-Randomized (neural) networks (currently Python & R)☆20Feb 22, 2026Updated last week
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- ☆17Feb 16, 2024Updated 2 years ago
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- web安全机器学习入门☆13Jan 9, 2019Updated 7 years ago
- Convergent Cross-Mapping☆21Jun 23, 2018Updated 7 years ago
- Implementation of the Latent CCM paper☆18Jun 8, 2024Updated last year
- Multiresolution Knowledge Distillation for Anomaly Detection,用于异常检测的多分辨率知识蒸馏☆17Jun 17, 2021Updated 4 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- An end-to-end tutorial to forecast the M5 dataset using feature engineering pipelines and gradient boosting.☆20Feb 5, 2023Updated 3 years ago
- ☆21Jan 27, 2025Updated last year
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- [ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection☆174Mar 24, 2023Updated 2 years ago
- PSO On neural Network and LSTM☆19Jun 22, 2021Updated 4 years ago