IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they contain. In response, network intrusion detection systems have been developed to detect suspicious network activity. UNSW-NB15 is an IoT-based network traffic data set with different categories for normal activitie…
☆78Apr 3, 2021Updated 4 years ago
Alternatives and similar repositories for Iot-Cyber-Security-with-Machine-Learning-Research-Project
Users that are interested in Iot-Cyber-Security-with-Machine-Learning-Research-Project are comparing it to the libraries listed below
Sorting:
- The continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆58Apr 30, 2021Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- The project aims to analyse different types of attacks using the Bot-IoT dataset and also apply & compare different classification algori…☆11Oct 19, 2021Updated 4 years ago
- Predicting Internet of Things(IoT) Malware Attacks. Door Bells, Thermostats, Baby Monitors, Web Cameras, and Security Cameras attacked by…☆16Feb 21, 2021Updated 5 years ago
- ☆11May 1, 2021Updated 4 years ago
- IoT intrusion Detection Model based on neural network and random forests☆48Oct 16, 2018Updated 7 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆107Jan 20, 2020Updated 6 years ago
- Botnet detection on IoT Devices☆30Mar 7, 2021Updated 5 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB☆14Apr 21, 2023Updated 2 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆20Apr 29, 2024Updated last year
- An intelligent classifier based Intrusion Detection System for IoV’s based on Neural Networks like optimized CNN, transfer learning and e…☆18May 19, 2022Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- stock market predictions using sentiment analysis, a deep learning project(data and news based on pakistani stock exchange and news(Dawn …☆18Oct 14, 2020Updated 5 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆199Apr 21, 2023Updated 2 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆92Sep 19, 2020Updated 5 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Machine Learning for Cyber Security☆48Dec 25, 2019Updated 6 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Scanner for supply chain containing potential malware☆39Jan 17, 2026Updated last month
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning, Recurrent Neural Netwo…☆20Feb 26, 2024Updated 2 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆221Apr 25, 2024Updated last year
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- The python code generated random demands of random EV vehicles and household electricity demands. It then plots the graphs between earlie…☆25Jul 26, 2018Updated 7 years ago
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆29Apr 3, 2022Updated 3 years ago
- Sissy Life CYOA☆12Sep 4, 2015Updated 10 years ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆77Feb 5, 2026Updated last month
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- A Deep Learning approach toward creating a NIDS using python☆25Aug 8, 2023Updated 2 years ago
- ☆30Nov 12, 2022Updated 3 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- The xAPI Learning Cohort is a free, vendor-neutral, 12-week learning-by-doing project-based team learning experience about the Experience…☆21Apr 27, 2022Updated 3 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year