☆31Mar 2, 2018Updated 8 years ago
Alternatives and similar repositories for ids-deep-learning
Users that are interested in ids-deep-learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Jun 30, 2019Updated 6 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- ☆19Mar 29, 2022Updated 4 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆78Oct 11, 2021Updated 4 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- Code for our submission to IEEE CNS 2022☆25Oct 10, 2023Updated 2 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 3 years ago
- 自习室预约小程序就是用户在使用小程序在线订场服务,在小程序中,可以直观的看到自习室的预约情况、预约费用,然后在线缴付订金。还可以邀请小伙伴一起组队,只需要几分钟就能完成整个预约过程。有了自习室小程序,要查看附近有哪些自习室,直接在微信打开附近的小程序,周边自习室一览无遗;想…☆15Sep 29, 2022Updated 3 years ago
- Network Intrusion Detection System(Abnormal Detection)☆11Jun 14, 2020Updated 5 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆30Sep 23, 2025Updated 6 months ago
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Jul 18, 2018Updated 7 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆91Sep 19, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Botnet detection on IoT Devices☆30Mar 7, 2021Updated 5 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 6 years ago
- DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.☆13May 12, 2021Updated 4 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆197Sep 3, 2023Updated 2 years ago
- 基于Flink实现实时冰蝎(Behinder)流量检测☆39Sep 30, 2019Updated 6 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- IoT device type identification using machine learning techniques.☆40Aug 18, 2018Updated 7 years ago
- Adaptive Decomposition and Extraction Network of Individual Fingerprint Features for Specific Emitter Identification☆13Aug 25, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 📊 Source code for 'Query a Digital Music Store Database' project☆12Aug 29, 2018Updated 7 years ago
- Calculate flow statistics from a given network capture file.☆18Nov 22, 2015Updated 10 years ago
- Computational Public Opinion Research☆12Jan 25, 2024Updated 2 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 6 months ago
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆18Jun 18, 2024Updated last year
- Implementation of https://arxiv.org/pdf/1512.03385.pdf☆10Apr 8, 2019Updated 7 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆46Jun 3, 2019Updated 6 years ago
- Source code from the article "Modularity-Aware Graph Autoencoders for Joint Community Detection and Link Prediction" (Neural Networks, 20…☆16Dec 6, 2022Updated 3 years ago
- A tool for deriving statistical features from PCAP data☆13Nov 21, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)☆19Jul 9, 2019Updated 6 years ago
- This repository contains my solution of CSES problems in PYTHON..☆14Jan 22, 2021Updated 5 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 11 years ago
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago