munirKarsli / Network-Intrusion-Detection-With-Deep-Learning-On-Nsl-Kdd-DatasetView external linksLinks
☆23May 15, 2019Updated 6 years ago
Alternatives and similar repositories for Network-Intrusion-Detection-With-Deep-Learning-On-Nsl-Kdd-Dataset
Users that are interested in Network-Intrusion-Detection-With-Deep-Learning-On-Nsl-Kdd-Dataset are comparing it to the libraries listed below
Sorting:
- Using NSL_KDD data☆28Mar 3, 2019Updated 6 years ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆27Sep 25, 2020Updated 5 years ago
- ☆20Jul 10, 2024Updated last year
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated last year
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆16Dec 5, 2020Updated 5 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Oct 2, 2020Updated 5 years ago
- ☆14Sep 15, 2021Updated 4 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- Code Snippet used to convert CSV dataset into Images in IEEE Published Article: IoT DoS and DDoS Attack Detection using ResNet☆14Aug 21, 2021Updated 4 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- ☆20Mar 25, 2024Updated last year
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Jun 14, 2021Updated 4 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Oct 20, 2020Updated 5 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆48Aug 10, 2020Updated 5 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- ☆20Jan 20, 2021Updated 5 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆26May 8, 2020Updated 5 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Encrypted Network Traffic Classification using Deep Learning☆60Apr 3, 2024Updated last year
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Official implementation for masked contrastive learning for anomaly detection.(IJCAI-21)☆18May 26, 2021Updated 4 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆49Jun 13, 2024Updated last year
- A tunneled flooding traffic detection system.☆30Dec 3, 2024Updated last year
- IoT intrusion Detection Model based on neural network and random forests☆48Oct 16, 2018Updated 7 years ago
- 将大容量PCAP按流切分成小PCAP☆24Jun 6, 2023Updated 2 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- ☆24Mar 11, 2022Updated 3 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆30Aug 28, 2022Updated 3 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆33Dec 6, 2024Updated last year