Application of novel EC-GAN method on Network Intrusion Detection
☆24Dec 24, 2021Updated 4 years ago
Alternatives and similar repositories for EC-GAN_NIDS
Users that are interested in EC-GAN_NIDS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GAN / AUTOENCODER for network intrusion detection using NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd☆19Apr 25, 2023Updated 2 years ago
- A GAN-based model focused on anomaly detection in discrete dataset☆26Dec 30, 2019Updated 6 years ago
- ☆11Apr 7, 2026Updated last week
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆13Mar 5, 2024Updated 2 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Jul 15, 2022Updated 3 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- ☆21Apr 8, 2026Updated last week
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆51Sep 20, 2024Updated last year
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆18May 10, 2023Updated 2 years ago
- ☆12Apr 7, 2026Updated last week
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Anomaly Detection using PCA and BiGAN☆14Sep 27, 2020Updated 5 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 基于Vue2+Django+LogisticRegressionCV,KDD-CUP99的网络入侵检测☆14Apr 6, 2022Updated 4 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- ☆21Sep 21, 2020Updated 5 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆27Jan 6, 2020Updated 6 years ago
- Code for PAKDD 2023 paper: TSI-GAN: Unsupervised Time Series Anomaly Detection using Convolutional Cycle-Consistent Generative Adversaria…☆12Nov 29, 2024Updated last year
- ☆43Dec 26, 2020Updated 5 years ago
- ☆55Nov 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generative adversarial networks for Network Intrusion Benchmark datasets☆42Aug 2, 2024Updated last year
- ☆20Jul 10, 2024Updated last year
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆29Apr 3, 2022Updated 4 years ago
- GAN_based_Intrusion_Detection_System_for_in-vehicle_network☆17Dec 3, 2024Updated last year
- CANTransfer: Transfer learning based intrusion detection on a controller area network using convolutional LSTM network☆17Sep 21, 2020Updated 5 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- A basic implementation of genetic algorithm for traveling salesman problem☆11Jul 26, 2020Updated 5 years ago
- ☆12Aug 20, 2023Updated 2 years ago
- ☆10Jul 29, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- Developed an best EEG Channel Selection Model Using Technique like MIMR☆10May 1, 2022Updated 3 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- 🕵️♂️ ML project to identify malicious web payloads, aimed at boosting the effectiveness of WAFs and IDSs.☆15Apr 7, 2024Updated 2 years ago
- PSO feature selection improves classifier performance. Implemented in Jupyter Notebook with pandas, numpy, scikit-learn. PSO done from sc…☆12Jan 30, 2023Updated 3 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- CANET: An Effective CNN-Attention Model for Network Intrusion Detection☆39Apr 21, 2023Updated 2 years ago