The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and external network traffic data. Various measures, such as accuracy, detection rates, false alarm rates, F1 scores, and model execution time, are used to assess the model's feasibility, efficacy, and efficiency.…
☆15May 18, 2022Updated 3 years ago
Alternatives and similar repositories for Hybrid-IDS_CICIDS2018
Users that are interested in Hybrid-IDS_CICIDS2018 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Traffic Classification with Graph Neural Networks☆12Nov 4, 2023Updated 2 years ago
- Code for our submission to the WTMC 2021 workshop☆15Jul 14, 2021Updated 4 years ago
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆17Feb 19, 2025Updated last year
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- ☆24Nov 9, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Generate synthetic network attack packet flows using generative adversarial networks.☆30Dec 5, 2020Updated 5 years ago
- Official implementation of "Continual Learning by Modeling Intra-Class Variation" (MOCA). [TMLR 2023]☆16Mar 3, 2023Updated 3 years ago
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆33Apr 8, 2022Updated 4 years ago
- ☆11Apr 7, 2026Updated 3 weeks ago
- Based on the CICIDS2017 dataset and Pytorch platform☆30May 8, 2019Updated 6 years ago
- CNN-LSTM-attention☆10Jan 6, 2021Updated 5 years ago
- ☆14Sep 23, 2024Updated last year
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- ☆18Jan 2, 2026Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Access Control List for Tornado (or just plain Python)☆29Sep 4, 2012Updated 13 years ago
- Paper "Optimization of Convolutional Neural Network Using the Linearly Decreasing Weight Particle Swarm Optimization" Program☆11Mar 9, 2022Updated 4 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- a classification for N-BaloT which is a Anomaly Detection☆17May 4, 2022Updated 3 years ago
- ☆12Aug 20, 2023Updated 2 years ago
- The project aims to analyse different types of attacks using the Bot-IoT dataset and also apply & compare different classification algori…☆11Oct 19, 2021Updated 4 years ago
- Implementation of Graph Convolutional Networks in TensorFlow☆12Jun 12, 2017Updated 8 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated 2 years ago
- An automated smart contract vulnerability repair tool☆12Aug 15, 2023Updated 2 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- An implementation of Gated Recurrent Unit☆15May 6, 2019Updated 6 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 6 years ago
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆15Aug 28, 2024Updated last year
- AI Computing System(professional elective in the 6th semester in NKUCS) programming assignments on Cambricon. The course is a combination…☆14Jul 10, 2022Updated 3 years ago
- Application of novel EC-GAN method on Network Intrusion Detection☆24Dec 24, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆14Apr 22, 2021Updated 5 years ago
- 编译原理C语言LL1语法分析器的简单实现☆12Aug 31, 2020Updated 5 years ago
- The code of flow-by-flow network traffic prediction.☆15Aug 14, 2022Updated 3 years ago
- ☆11May 14, 2020Updated 5 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- ☆21May 1, 2024Updated last year