A thesis submitted for the degree of Master of Science in Computer Networks and Security
☆238Nov 16, 2022Updated 3 years ago
Alternatives and similar repositories for Anomaly-Detection-in-Networks-Using-Machine-Learning
Users that are interested in Anomaly-Detection-in-Networks-Using-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆46Jun 13, 2022Updated 3 years ago
- This project is created to show how machine learning can be used to detect anomalies in network traffic.☆56Sep 26, 2020Updated 5 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆39Aug 8, 2020Updated 5 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆28Jan 26, 2022Updated 4 years ago
- Machine Learning in Cybersecurity☆91May 23, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- Based on the CICIDS2017 dataset and Pytorch platform☆30May 8, 2019Updated 6 years ago
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆582Apr 1, 2026Updated last week
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆121Oct 19, 2023Updated 2 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- A tool for deriving statistical features from PCAP data☆13Nov 21, 2019Updated 6 years ago
- ML based intrusion detection system☆21Jun 18, 2021Updated 4 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆686Dec 4, 2023Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆200Apr 21, 2023Updated 2 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 4 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆225Apr 25, 2024Updated last year
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆765May 8, 2019Updated 6 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- Visual Stream Processing For The DeepLens System☆10Nov 21, 2022Updated 3 years ago
- A Behavior-Based Device Identification Method for the IoT☆61Feb 25, 2025Updated last year
- A GRU deep learning system against attacks in Software Defined Networks (SDN).☆34Apr 19, 2024Updated last year
- ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution☆15Jun 10, 2022Updated 3 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- Apply modern, deep learning techniques for anomaly detection to identify network intrusions.☆52Mar 12, 2026Updated last month
- FL-based intrusion detection system development using model averaging.☆44Dec 18, 2022Updated 3 years ago
- A machine learning based Intrusion Detection System☆169Dec 11, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- Machine learning based Intrusion detection system (IDS)☆65Jan 4, 2022Updated 4 years ago
- Identifying malicious/benign network traffic using classification methods.☆10Sep 27, 2022Updated 3 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆120Jan 10, 2024Updated 2 years ago
- 基于神经网络的流量异常检测☆153Jul 28, 2020Updated 5 years ago
- This project has been conducted under the supervision of Dr. Jinoh Kim and Dr. Donghwoon Kwon at Texas A&M University-Commerce. The res…☆16Jan 30, 2019Updated 7 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago