maliksh7 / DeepMADLinks
Malicious Activity Detection System. Final Year Project. Deep Learning-based solution, which analyses Network Activity sequences to classify whether the certain node is Malicious or Benign. Devising a tool/software which will detect malicious Network Activity Detection using Deep Learning Model. Tools: Python, Neural Network (BERT), Google Col…
☆11Updated 9 months ago
Alternatives and similar repositories for DeepMAD
Users that are interested in DeepMAD are comparing it to the libraries listed below
Sorting:
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆16Updated 4 years ago
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆99Updated 2 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Updated 7 years ago
- ☆70Updated 2 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆67Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 10 months ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆52Updated 3 years ago
- This program allow you to extract some features from pcap files.☆39Updated 2 years ago
- ☆50Updated 9 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆280Updated last year
- DDoS attack analysis using Machine Learning☆44Updated 4 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆104Updated 5 years ago
- A machine learning based Intrusion Detection System☆142Updated 5 years ago
- A collection of resources for security data☆41Updated 7 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆134Updated 3 years ago
- Machine Learning For Cybersecurity.☆66Updated 5 years ago
- Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.☆120Updated last year
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆141Updated 6 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆156Updated 5 years ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆69Updated 10 months ago
- SSH traffic analysis☆23Updated 6 years ago
- This project aims to analyze and classify a real network traffic dataset to detect malicious/benign traffic records. It compares and tune…☆21Updated last year
- ☆15Updated 8 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆103Updated 7 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆171Updated 2 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆225Updated 2 years ago
- Free Malware Training Datasets for Machine Learning☆233Updated 4 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆156Updated this week
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆52Updated 4 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆26Updated 3 years ago