Detection of network traffic anomalies using unsupervised machine learning
☆28Jan 26, 2022Updated 4 years ago
Alternatives and similar repositories for ML-Anomaly-Detection
Users that are interested in ML-Anomaly-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Anomaly Detection in Network Traffic using different clustering algorithm.☆18Jun 8, 2017Updated 8 years ago
- This project aims to detect the anomalies in Web-Traffic using a C-LSTM architecture.☆26May 25, 2020Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 7 years ago
- Purposed a network traffic classification and prediction model based on CNN, TCN and Attention mechanism.☆23Nov 13, 2023Updated 2 years ago
- AI & Machine Learning: Detection and Classification of Network Traffic Anomalies based on IoT23 Dataset☆93Jul 30, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆238Nov 16, 2022Updated 3 years ago
- ☆22May 21, 2024Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆18Mar 14, 2025Updated last year
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆13Apr 28, 2023Updated 3 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- 采用VAE模型实现网络流量异常检测,并结合联邦学习与蒸馏学习☆17Dec 1, 2023Updated 2 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- learn to allocate wireless resources with GNN in over-the-air FL system☆10Jun 4, 2023Updated 2 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 4 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- Public Arena dataset☆15Jul 20, 2022Updated 3 years ago
- SIGIR 2022: Privacy-Preserving Synthetic Data Generation for Recommendation Systems☆11Nov 17, 2022Updated 3 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 2 months ago
- IoT intrusion Detection Model based on neural network and random forests☆50Oct 16, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆29Mar 11, 2022Updated 4 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- Long Short-Term Memory Recurrent Neural Network for Traffic Prediction in Cellular Networks☆12Sep 28, 2020Updated 5 years ago
- ☆22Feb 11, 2025Updated last year
- Deep learning for named entity recognition on CoNLL-2003☆10Dec 23, 2016Updated 9 years ago
- Enable RNNLM lattice rescoring with Pytorch [kaldi]☆12Jun 5, 2020Updated 5 years ago
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆13Dec 1, 2023Updated 2 years ago
- Log-based anomaly detection☆14Jul 2, 2025Updated 10 months ago
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Visual-Text dataset based on NFT metadata☆19Nov 7, 2024Updated last year
- ☆25Dec 15, 2024Updated last year
- PyTorch implementation of the ICML 2020 paper "Latent Bernoulli Autoencoder"☆25Apr 8, 2021Updated 5 years ago
- 基于机器学习的DDoS入侵检测算法☆14Mar 14, 2022Updated 4 years ago
- 收集了部分将机器学习应用于网络流量分类的论文☆174Jul 5, 2020Updated 5 years ago
- The source code for the paper "LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization".☆19Dec 3, 2023Updated 2 years ago
- ☆21Nov 14, 2024Updated last year