A thesis submitted for the degree of Master of Science in Computer Networks and Security
☆238Nov 16, 2022Updated 3 years ago
Alternatives and similar repositories for Anomaly-Detection-in-Networks-Using-Machine-Learning
Users that are interested in Anomaly-Detection-in-Networks-Using-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆47Jun 13, 2022Updated 3 years ago
- This project is created to show how machine learning can be used to detect anomalies in network traffic.☆55Sep 26, 2020Updated 5 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆28Jan 26, 2022Updated 4 years ago
- Machine Learning in Cybersecurity☆91May 23, 2025Updated 10 months ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- Based on the CICIDS2017 dataset and Pytorch platform☆29May 8, 2019Updated 6 years ago
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆573Aug 6, 2025Updated 7 months ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆114Oct 19, 2023Updated 2 years ago
- A tool for deriving statistical features from PCAP data☆13Nov 21, 2019Updated 6 years ago
- ML based intrusion detection system☆21Jun 18, 2021Updated 4 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆676Dec 4, 2023Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- A Behaviour-Based Fingerprinting Method for Device Identification in the IoT☆29Nov 6, 2022Updated 3 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆199Apr 21, 2023Updated 2 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 4 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆223Apr 25, 2024Updated last year
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- A Behavior-Based Device Identification Method for the IoT☆60Feb 25, 2025Updated last year
- A GRU deep learning system against attacks in Software Defined Networks (SDN).☆34Apr 19, 2024Updated last year
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆33Apr 8, 2022Updated 3 years ago
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆15Jun 10, 2022Updated 3 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆51Mar 12, 2026Updated last week
- FL-based intrusion detection system development using model averaging.☆44Dec 18, 2022Updated 3 years ago
- A machine learning based Intrusion Detection System☆165Dec 11, 2019Updated 6 years ago
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- Machine learning based Intrusion detection system (IDS)☆66Jan 4, 2022Updated 4 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- This program allow you to extract some features from pcap files.☆39Apr 4, 2023Updated 2 years ago
- Identifying malicious/benign network traffic using classification methods.☆10Sep 27, 2022Updated 3 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆121Jan 10, 2024Updated 2 years ago
- 基于神经网络的流量异常检测☆153Jul 28, 2020Updated 5 years ago