A research & development project to create and deploy a Network-based Intrusion Detection System (IDS) to detect intruders on a distributed system. That is, it detects and classify threatening or anomalous network traffic as opposed to safe traffic and usage. The project runs on a real-time, distributed cluster on Apache Storm which processes in…
☆12Jan 9, 2019Updated 7 years ago
Alternatives and similar repositories for Distributed-Network-Intrusion-Detection-System-with-Machine-Learning
Users that are interested in Distributed-Network-Intrusion-Detection-System-with-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anomaly Detection in Network Traffic using different clustering algorithm.☆18Jun 8, 2017Updated 8 years ago
- Improved Autoencoder-based Ensemble In-vehicle Intrusion Detection System☆13Oct 3, 2023Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- 《Java加密与解密的艺术》第2版☆12Jan 17, 2019Updated 7 years ago
- Voice Recognition using FPGA-Based Neural Networks☆15Jul 6, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.☆13May 12, 2021Updated 4 years ago
- Collection of Python scripts for preference aggregation, estimation, and generation. Currently under initial development☆11Apr 20, 2019Updated 6 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- Java从入门到精通☆11Jun 15, 2018Updated 7 years ago
- A python project that aims to verify or identify a speaker☆11May 24, 2019Updated 6 years ago
- ☆12Sep 2, 2016Updated 9 years ago
- The prototype implementation of our USENIX 2023 paper☆15Apr 25, 2023Updated 2 years ago
- Snowkylin's Blog - 雪麒的百草园☆14Nov 26, 2025Updated 4 months ago
- A simple mysql proxy.☆12Oct 23, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- a simple asr system☆14Mar 8, 2018Updated 8 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- 基于 websocket 的开源聊天室☆16Jul 23, 2018Updated 7 years ago
- GainSkill is a course selling platform where Instructors can publish their courses, also can add course related quiz. Students can enroll…☆22Mar 22, 2025Updated last year
- CPU-based multi-thread implementation of Task-guided and Path-augmented Heterogeneous Network Embedding☆17Jun 22, 2017Updated 8 years ago
- This project is created to show how machine learning can be used to detect anomalies in network traffic.☆56Sep 26, 2020Updated 5 years ago
- Quantum Safe OpenSSH☆18Apr 24, 2023Updated 2 years ago
- GAN / AUTOENCODER for network intrusion detection using NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd☆19Apr 25, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Product Recommender System for Retail Dataset☆14Sep 22, 2020Updated 5 years ago
- Portfolio website developed and deployed using Streamlit☆17Jun 28, 2024Updated last year
- Android RSA加密解密☆15Sep 16, 2015Updated 10 years ago
- Playing around with IDS data in Keras☆13Apr 13, 2020Updated 5 years ago
- ☆14Jul 22, 2024Updated last year
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- Cervical cancer is the second most common type of cancer that is found in the women worldwide. Generally, cancer caused due to irregular …☆10Mar 24, 2019Updated 7 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- denosing for dirty document image☆13May 20, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 手把手教你ShardingSphere入门☆15Nov 13, 2020Updated 5 years ago
- Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.☆15Oct 17, 2020Updated 5 years ago
- AI Programming with Python Nanodegree Program: https://www.udacity.com/course/ai-programming-python-nanodegree--nd089☆26Mar 24, 2023Updated 3 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Jun 17, 2019Updated 6 years ago
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆29Apr 3, 2022Updated 4 years ago
- ☆16Jul 15, 2022Updated 3 years ago