☆22May 21, 2024Updated last year
Alternatives and similar repositories for Network-Traffic-Analysis-using-Machine-learning
Users that are interested in Network-Traffic-Analysis-using-Machine-learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI for Network Monitoring: A collection of data-driven and ML/AI methods for designing efficient Internet monitoring strategies and measu…☆14Sep 26, 2023Updated 2 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Detection of network traffic anomalies using unsupervised machine learning☆28Jan 26, 2022Updated 4 years ago
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Oct 2, 2020Updated 5 years ago
- A web-based application that provides a SQL editor to run queries and display results.☆15Mar 29, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This project has been conducted under the supervision of Dr. Jinoh Kim and Dr. Donghwoon Kwon at Texas A&M University-Commerce. The res…☆16Jan 30, 2019Updated 7 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last month
- SSH traffic analysis☆23Apr 16, 2019Updated 6 years ago
- A Network Anomaly Detection system that leverages machine learning to monitor and identify unusual activities in network traffic in real-…☆26Jun 19, 2024Updated last year
- - Image classification using Deep learning. - Utilizing both frequency and pixel domain information of images. - Implemented MVNN model f…☆19Mar 25, 2023Updated 3 years ago
- Cyber Security Course Term Project☆15May 27, 2017Updated 8 years ago
- ☆14Jun 26, 2022Updated 3 years ago
- This project aims to analyze and classify a real network traffic dataset to detect malicious/benign traffic records. It compares and tune…☆25May 1, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.☆22Mar 30, 2026Updated last week
- ☆15Aug 25, 2021Updated 4 years ago
- I share the solutions and scripts of the questions I like in the CTF I enter.☆18Feb 16, 2024Updated 2 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆118Oct 19, 2023Updated 2 years ago
- IForestASD for Anomaly Detection in Scikit-MultiFLow☆28Jun 21, 2020Updated 5 years ago
- Battle for Hill 218 game implemented for BoardGameArena☆13Apr 10, 2022Updated 4 years ago
- A Password Manager project created using the MERN stack☆27Aug 9, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆41Sep 23, 2023Updated 2 years ago
- FDFtNet: Facing Off Fake Images using Fake Detection Fine-tuning Network. (IFIP-SEC 2020)☆32Dec 24, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Golang neural network - fast and easy classification and regression.☆12Jun 7, 2021Updated 4 years ago
- ☆13May 21, 2024Updated last year
- hiding an image or text within another image☆36Jun 18, 2018Updated 7 years ago
- Mininet SDN based experiments on load balancing and improving server response times☆28Nov 4, 2020Updated 5 years ago
- This project is created to show how machine learning can be used to detect anomalies in network traffic.☆56Sep 26, 2020Updated 5 years ago
- C++ solution for the chinese postman problem☆29Jul 7, 2021Updated 4 years ago
- Replace faces in image(s) with Tom wiggle or your own Gif!☆12Jul 26, 2017Updated 8 years ago
- ☆11Sep 25, 2022Updated 3 years ago
- One Repository of AI Series: Collecting the useful technology articles, opensource tutorials and opensource books. 我的AI系列仓库之一:收集有用的技术文章、开…☆10Nov 14, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 抖音开发者使用OpenAPI接口,本次开放了java、python、php三种语言的SDK包☆10May 20, 2022Updated 3 years ago
- Machine Learning Project to Compare and Evaluate Text Summarization Algorithms Using SpaCy, NLTK, Gensim, and Sumy.☆40Feb 20, 2026Updated last month
- 🐉ZeroJava to zMIPS compiler for creation of Zero-Knowledge Proofs☆13Apr 1, 2022Updated 4 years ago
- A Golang utility for working with files☆16Jan 23, 2019Updated 7 years ago
- Coburg Intrusion Detection Data Sets☆51Oct 25, 2017Updated 8 years ago
- ☆62Jun 22, 2015Updated 10 years ago
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆51Feb 14, 2026Updated last month