CSE-CIC-IDS-2018 analyze with Random Forest
☆30Apr 4, 2021Updated 5 years ago
Alternatives and similar repositories for cic-ids-2018
Users that are interested in cic-ids-2018 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Machine Learning Based - Intrusion Detection System☆33Jun 21, 2022Updated 3 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- 基于IDS 2018数据集使用LightGBM和XGBoost实现DDoS流量分类 sFlow RT&Mininet流量采集与分类 杭电综合项目实践☆30Dec 25, 2020Updated 5 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆765May 8, 2019Updated 6 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Intrusion detection system with Apache Spark and deep learning☆18Mar 14, 2019Updated 7 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- IoT intrusion Detection Model based on neural network and random forests☆49Oct 16, 2018Updated 7 years ago
- ☆34Dec 18, 2021Updated 4 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- A machine learning based Intrusion Detection System☆169Dec 11, 2019Updated 6 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- Projects based on Machine Learning☆10May 8, 2020Updated 5 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- In this repository, DDOS attacks were detected using Recurrent Neural Networks (LSTM) and Classical Machine Learning Algorithms.☆19Jun 28, 2021Updated 4 years ago
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆14Apr 25, 2021Updated 4 years ago
- An anomaly-based intrusion detection system.☆85Dec 8, 2022Updated 3 years ago
- Detailed Comparative analysis of DDoS detection using Machine Learning Models☆15Jan 20, 2024Updated 2 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆175Dec 15, 2019Updated 6 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆49May 17, 2020Updated 5 years ago
- Content Based Fake News Detection Using Knowledge Graphs. BSc Honours Project - University of Aberdeen - academic year 2017/2018☆10Mar 26, 2019Updated 7 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Jun 14, 2021Updated 4 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Aug 12, 2017Updated 8 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆94Oct 18, 2019Updated 6 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- This project is about the undergraduate thesis, the main idea is about route allocation algorithm.☆11Mar 28, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Using the 1998 DARPA Intrusion Detection Evaluation dataset I configured a Random Forest model for anomaly detection☆14Feb 15, 2019Updated 7 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆19Jul 9, 2025Updated 9 months ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆13Jun 21, 2021Updated 4 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Multi-label feature selection using Ant colony optimization☆16Jun 28, 2021Updated 4 years ago
- Using ML techniques to detect and characterize DDoS traffic using the CIC_DDoS2019 dataset☆25Aug 27, 2022Updated 3 years ago
- A Web-Application based service which can control/assign the bandwidth of a Virtual Network based on Mininet using RYU as the SDN Control…☆12Apr 24, 2020Updated 5 years ago