Deep Learning Tool for Off-line Network Intrusion Detection System
☆23Oct 15, 2018Updated 7 years ago
Alternatives and similar repositories for NetLearner
Users that are interested in NetLearner are comparing it to the libraries listed below
Sorting:
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆270Apr 5, 2020Updated 5 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- Intrusion detection engine for Cloud Systems built using Alternative Fuzzy C-mean Clustering and Artificial Neural Network☆19May 8, 2018Updated 7 years ago
- Implementation of "ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection"☆15May 17, 2022Updated 3 years ago
- Intrusion detection system with Apache Spark and deep learning☆18Mar 14, 2019Updated 6 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆54Apr 9, 2019Updated 6 years ago
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆28Jun 25, 2019Updated 6 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- Excel MCP Server - Manipulate Excel files without Microsoft Excel. Model Context Protocol for XLSX, XLSM with Claude AI integration☆24Jun 18, 2025Updated 8 months ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- Code for the NAACL 2024 HCI+NLP Workshop paper "LLMCheckup: Conversational Examination of Large Language Models via Interpretability Tool…☆13Mar 24, 2024Updated last year
- GeeekPi UPS restore on power loss feature fix with 555 timer.☆10Dec 16, 2020Updated 5 years ago
- 《Java加密与解密的艺术》第2版☆12Jan 17, 2019Updated 7 years ago
- ☆11Sep 8, 2022Updated 3 years ago
- Package for word stress detection☆11Jan 27, 2023Updated 3 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- ☆13Sep 23, 2024Updated last year
- ☆11Nov 21, 2022Updated 3 years ago
- A research & development project to create and deploy a Network-based Intrusion Detection System (IDS) to detect intruders on a distribut…☆12Jan 9, 2019Updated 7 years ago
- The Trader Gateway of Distributed Commodities OTC Electronic Trading System☆13Jun 12, 2018Updated 7 years ago
- An analysis of the released data on FinCrime Files transactions as depicted on SARs.☆10Nov 26, 2020Updated 5 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- ✓ Using scapy and nmap tools, find out ip/port, ARP SPOOFING & TCP SESSION HIJACKING ✓ Using snort tool provided Intrusion Detection Syst…☆10Oct 29, 2019Updated 6 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆93Oct 18, 2019Updated 6 years ago
- 🏛️ Open-source toolkit for accessing SEC EDGAR financial data with Python and TypeScript/JavaScript SDKs. Features comprehensive parsing…☆24Aug 13, 2025Updated 6 months ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Jun 10, 2020Updated 5 years ago
- This project aims to detect Intrusions with a network using deep learning. The network traffic data is converted to multi channel RGB ima…☆12Nov 27, 2021Updated 4 years ago
- Holds the research group website.☆13Feb 13, 2026Updated 2 weeks ago
- ☆11Feb 18, 2022Updated 4 years ago
- Bad bad bad bad bad stuff☆12Jun 10, 2019Updated 6 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Analyze a real-time IPv4 packet stream and export metrics about the data flows☆14Jan 29, 2020Updated 6 years ago