☆23May 15, 2019Updated 6 years ago
Alternatives and similar repositories for Network-Intrusion-Detection-With-Deep-Learning-On-Nsl-Kdd-Dataset
Users that are interested in Network-Intrusion-Detection-With-Deep-Learning-On-Nsl-Kdd-Dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆27Sep 25, 2020Updated 5 years ago
- Using NSL_KDD data☆28Mar 3, 2019Updated 7 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆49Jun 13, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 6 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- ☆20Jul 10, 2024Updated last year
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Jun 14, 2021Updated 4 years ago
- Machine Learning and Deep Learning models for Anomaly Detection☆10Mar 10, 2019Updated 7 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆76Oct 20, 2020Updated 5 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- IoT intrusion Detection Model based on neural network and random forests☆49Oct 16, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆766May 8, 2019Updated 6 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Oct 2, 2020Updated 5 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆48Sep 24, 2022Updated 3 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CICIDS2017 dataset☆70Jan 4, 2022Updated 4 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- Autoencoder approach to detect attacks/intrusions in a network☆10Mar 25, 2023Updated 3 years ago
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆41Sep 4, 2016Updated 9 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 3 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Code for reproducing experiments on MNIST and CIFAR-10 in paper "Positive-Unlabeled Learning with Non-Negative Risk Estimator".☆21Nov 4, 2022Updated 3 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆297Dec 22, 2023Updated 2 years ago
- ☆15Sep 15, 2021Updated 4 years ago
- AnomalyDAE (ICASSP2020)☆52Apr 17, 2020Updated 6 years ago
- Template for Compose KMP project☆16Nov 25, 2023Updated 2 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- ☆17Nov 16, 2023Updated 2 years ago