harshilpatel1799 / Iot-Cyber-Security-with-Machine-Learning-Research-ProjectView external linksLinks
IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they contain. In response, network intrusion detection systems have been developed to detect suspicious network activity. UNSW-NB15 is an IoT-based network traffic data set with different categories for normal activitie…
☆76Apr 3, 2021Updated 4 years ago
Alternatives and similar repositories for Iot-Cyber-Security-with-Machine-Learning-Research-Project
Users that are interested in Iot-Cyber-Security-with-Machine-Learning-Research-Project are comparing it to the libraries listed below
Sorting:
- The continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆58Apr 30, 2021Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased …☆52May 21, 2019Updated 6 years ago
- Predicting Internet of Things(IoT) Malware Attacks. Door Bells, Thermostats, Baby Monitors, Web Cameras, and Security Cameras attacked by…☆15Feb 21, 2021Updated 4 years ago
- ☆34Dec 18, 2021Updated 4 years ago
- ☆11May 1, 2021Updated 4 years ago
- IoT intrusion Detection Model based on neural network and random forests☆48Oct 16, 2018Updated 7 years ago
- Deep Learning techniques can be implemented in the field of cybersecurity to handle the issues related to intrusion just as they have bee…☆24Jan 11, 2021Updated 5 years ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆17Feb 19, 2025Updated 11 months ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆106Jan 20, 2020Updated 6 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆12Jul 10, 2024Updated last year
- Botnet detection on IoT Devices☆30Mar 7, 2021Updated 4 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- This project is used for classification of SMS and Email spam.It has a full dashboard with login system connected to Mongo DB☆14Apr 21, 2023Updated 2 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- A machine learning based Intrusion Detection System☆162Dec 11, 2019Updated 6 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15May 17, 2022Updated 3 years ago
- stock market predictions using sentiment analysis, a deep learning project(data and news based on pakistani stock exchange and news(Dawn …☆17Oct 14, 2020Updated 5 years ago
- A project that is used to analyze multiple machine learning classifiers for DDoS detection from botnets and finalize the best classifier.…☆21Sep 30, 2022Updated 3 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆198Apr 21, 2023Updated 2 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆92Sep 19, 2020Updated 5 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26May 8, 2020Updated 5 years ago
- Scanner for supply chain containing potential malware☆38Jan 17, 2026Updated 3 weeks ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆219Apr 25, 2024Updated last year
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆143Jan 5, 2019Updated 7 years ago
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆28Apr 3, 2022Updated 3 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- The python code generated random demands of random EV vehicles and household electricity demands. It then plots the graphs between earlie…☆25Jul 26, 2018Updated 7 years ago
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆76Feb 5, 2026Updated last week
- A Deep Learning approach toward creating a NIDS using python☆25Aug 8, 2023Updated 2 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated 11 months ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆38Jan 16, 2021Updated 5 years ago
- Convolutional Neural Network (CNN) was trained on 48x48 pixel grayscale images to predict 5 different emotions from images. Ten different…☆11Sep 21, 2022Updated 3 years ago