☆31Mar 2, 2018Updated 8 years ago
Alternatives and similar repositories for ids-deep-learning
Users that are interested in ids-deep-learning are comparing it to the libraries listed below
Sorting:
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year
- ☆16Sep 12, 2018Updated 7 years ago
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- The pytorch implementation of E-GraphSAGE and E-ResGAT, two solutions for intrusion detection.☆77Oct 11, 2021Updated 4 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 5 years ago
- This implementation for the paper: Learning Neural Representations for Network Anomaly Detection. If you have questions, please do not he…☆18Aug 20, 2019Updated 6 years ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Jun 30, 2019Updated 6 years ago
- Code for our submission to IEEE CNS 2022☆24Oct 10, 2023Updated 2 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆29Sep 23, 2025Updated 5 months ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Botnet detection on IoT Devices☆30Mar 7, 2021Updated 5 years ago
- Netfilter queue binding in go☆38Dec 16, 2020Updated 5 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- Basic Machine learning projects and assignments done by me.☆33Aug 12, 2020Updated 5 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- ☆11May 1, 2021Updated 4 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 2 years ago
- IoT device type identification using machine learning techniques.☆40Aug 18, 2018Updated 7 years ago
- Building an Intrusion Detection System on UNSW-NB15 Dataset Based on Machine Learning Algorithm☆92Sep 19, 2020Updated 5 years ago
- ☆16Jan 26, 2025Updated last year
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- ☆22Aug 29, 2025Updated 6 months ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- 基于Flink实现实时冰蝎(Behinder)流量检测☆39Sep 30, 2019Updated 6 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- 📊 Source code for 'Query a Digital Music Store Database' project☆12Aug 29, 2018Updated 7 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- 利用知识图谱分析网络安全事件☆42Mar 30, 2020Updated 5 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Dec 15, 2017Updated 8 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- A useful tool for identifying the architecture, platform type, compiler, and operating system specifications by preprocessor feature supp…☆13Apr 22, 2022Updated 3 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago