jmnwong / NSL-KDD-DatasetLinks
☆59Updated 9 years ago
Alternatives and similar repositories for NSL-KDD-Dataset
Users that are interested in NSL-KDD-Dataset are comparing it to the libraries listed below
Sorting:
- NSL-KDD Dataset☆198Updated 10 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆216Updated last year
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆143Updated 6 years ago
- A machine learning based Intrusion Detection System☆159Updated 6 years ago
- ☆70Updated 2 years ago
- Machine-learning-based intrusion detection☆38Updated 7 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated last year
- PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html☆125Updated 5 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 8 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated 3 years ago
- KitNET is a lightweight online anomaly detection algorithm, which uses an ensemble of autoencoders.☆249Updated last year
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆166Updated last month
- Machine Learning in Cybersecurity☆87Updated 7 months ago
- Network Intrusion Detection System using Deep Learning Techniques☆169Updated 6 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆121Updated last year
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆93Updated 6 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 5 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆290Updated 2 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆69Updated 2 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 5 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆362Updated last year
- ☆297Updated last year
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆234Updated 3 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Updated 8 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆73Updated last year
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆64Updated 2 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆72Updated 2 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆173Updated 2 years ago