Detection of network traffic anomalies using unsupervised machine learning
☆28Jan 26, 2022Updated 4 years ago
Alternatives and similar repositories for ML-Anomaly-Detection
Users that are interested in ML-Anomaly-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆47Jun 13, 2022Updated 3 years ago
- Anomaly Detection in Network Traffic using different clustering algorithm.☆18Jun 8, 2017Updated 8 years ago
- This project aims to detect the anomalies in Web-Traffic using a C-LSTM architecture.☆26May 25, 2020Updated 5 years ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆74Aug 1, 2024Updated last year
- Purposed a network traffic classification and prediction model based on CNN, TCN and Attention mechanism.☆23Nov 13, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AI & Machine Learning: Detection and Classification of Network Traffic Anomalies based on IoT23 Dataset☆92Jul 30, 2021Updated 4 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆238Nov 16, 2022Updated 3 years ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- ☆13Dec 28, 2024Updated last year
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- learn to allocate wireless resources with GNN in over-the-air FL system☆10Jun 4, 2023Updated 2 years ago
- E-commerce businesses are always striving to provide personalized experiences to their customers to increase engagement and loyalty. One …☆10May 26, 2023Updated 2 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- An automated smart contract vulnerability repair tool☆12Aug 15, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 3 years ago
- This project is an open-source project based on a GAN network anomaly detection.☆14Aug 4, 2024Updated last year
- A simulation showcasing federated learning with homomorphic encryption☆10Sep 24, 2023Updated 2 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 5 months ago
- SIGIR 2022: Privacy-Preserving Synthetic Data Generation for Recommendation Systems☆11Nov 17, 2022Updated 3 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- Security Analytics UoM - COMP90073 - S2 2020☆10Oct 1, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- IoT intrusion Detection Model based on neural network and random forests☆48Oct 16, 2018Updated 7 years ago
- Fake News Detection☆11Dec 25, 2018Updated 7 years ago
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- Long Short-Term Memory Recurrent Neural Network for Traffic Prediction in Cellular Networks☆12Sep 28, 2020Updated 5 years ago
- ☆25Mar 13, 2021Updated 5 years ago
- ☆21Feb 11, 2025Updated last year
- Enable RNNLM lattice rescoring with Pytorch [kaldi]☆12Jun 5, 2020Updated 5 years ago
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆12Dec 1, 2023Updated 2 years ago
- Log-based anomaly detection☆14Jul 2, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic usi…☆14Mar 18, 2020Updated 6 years ago
- ☆23May 17, 2023Updated 2 years ago
- Visual-Text dataset based on NFT metadata☆19Nov 7, 2024Updated last year
- 基于机器学习的DDoS入侵检测算法☆14Mar 14, 2022Updated 4 years ago
- The source code for the paper "LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization".☆18Dec 3, 2023Updated 2 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- [ML4H 2022] This is the code for our paper `Counterfactual and Factual Reasoning over Hypergraphs for Interpretable Clinical Predictions …☆26Feb 6, 2024Updated 2 years ago