Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R. Java is used to prepare DataSets. R is used implement a neural network. Weka is used for data cleaning.
☆29May 20, 2015Updated 10 years ago
Alternatives and similar repositories for Network-Intrusion-Detection-System
Users that are interested in Network-Intrusion-Detection-System are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆41Sep 4, 2016Updated 9 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- Playing around with IDS data in Keras☆13Apr 13, 2020Updated 5 years ago
- Application Intrusion Detection projects☆19Aug 1, 2024Updated last year
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆28Jun 25, 2019Updated 6 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- https://www.kaggle.com/c/microsoft-malware-prediction/leaderboard☆22Mar 14, 2019Updated 7 years ago
- Network Security Analysis using Machine Learning on the NSL-KDD dataset from the KDD Cup 1999☆21Nov 3, 2019Updated 6 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html☆129Sep 8, 2020Updated 5 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- [ 2017 Graduation Project ] - Pulmonary Nodule Detection & Classification implemented Tensorflow and Caffe1☆12Jul 10, 2018Updated 7 years ago
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- Control your computer using hand motion and automata based gesture recognition to improve Human-Computer Interaction.☆16Feb 25, 2015Updated 11 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- Online multiclass boosting algorithm that uses VFDT as weak learners☆17Oct 24, 2018Updated 7 years ago
- Networking IDS , network traffic classification with ML. Final Project for ECE-417.☆14Jan 21, 2020Updated 6 years ago
- Emotion classification has always been a very challenging task in Computer Vision. Using the SSD object detection algorithm to extract th…☆25Aug 6, 2018Updated 7 years ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 2 years ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- [SNI] offloader with Do[CKER] backend[S]. Starts containers just-in-time. Registers LetsEncrypt certs on-the-fly.☆10May 7, 2019Updated 6 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆93Oct 18, 2019Updated 6 years ago
- This repository contains software for multi-agent simulation model of mixed traffic flow of connected (HVs) and automated vehicles (AVs) in …☆18May 17, 2020Updated 5 years ago
- Azure Managed HSM SSL/TLS Offload Library for F5 and Nginx☆19Sep 18, 2025Updated 6 months ago
- A charm to deploy and initialize Vault on Kubernetes and Machine models. Secure, store and tightly control access to tokens, passwords, c…☆12Updated this week
- High-level helpers for Kubernetes components☆20Updated this week
- C module OpenSSL import for Perfect.☆11Mar 20, 2023Updated 3 years ago
- ☆15Apr 26, 2023Updated 2 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- Prometheus Hardware Exporter is an exporter for Hardware Observer☆18Feb 2, 2026Updated last month
- Ansible automation RedHat Deployed OpenStack (RDO)☆20May 21, 2014Updated 11 years ago
- 📒 OSLogTrace - Apple System Logging, Signposts & Activity Tracing☆11Dec 1, 2019Updated 6 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆45Jun 3, 2019Updated 6 years ago
- Multithreaded audio for Node.js☆19Aug 31, 2021Updated 4 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- This charmed operator automates the operational procedures of running Traefik, an open-source application proxy.☆15Updated this week
- 🛡️ CA: Certificate Authority. ДСТУ: 4145. ITU/IETF: 3279, 5755, 7030, X.509.☆20Mar 8, 2026Updated 2 weeks ago