nuttysunday / Protocol-Based-Deep-Intrusion-Detection-for-DoS-Normal-and-DDoS-AttacksLinks
Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
☆23Updated 3 years ago
Alternatives and similar repositories for Protocol-Based-Deep-Intrusion-Detection-for-DoS-Normal-and-DDoS-Attacks
Users that are interested in Protocol-Based-Deep-Intrusion-Detection-for-DoS-Normal-and-DDoS-Attacks are comparing it to the libraries listed below
Sorting:
- Intrusion Detection System using Deep Reinforcement Learning and Generative Adversarial Networks☆50Updated last year
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆13Updated 2 years ago
- An Intrusion Detection System based on Deep Belief Networks☆89Updated 3 years ago
- A Deep Learning Based Intrusion Detection System for IIoT Networks☆12Updated last year
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 5 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆118Updated 3 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆11Updated last year
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆196Updated 2 years ago
- Deep learning models for network intrusion detection☆39Updated 2 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆75Updated 5 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆89Updated last year
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆50Updated last year
- An intelligent classifier based Intrusion Detection System for IoV’s based on Neural Networks like optimized CNN, transfer learning and e…☆18Updated 3 years ago
- Synthesis of Adversarial DDos Attacks Using Tabular Generative Adversarial Networks☆10Updated 2 years ago
- harshilpatel1799 / IoT-Network-Intrusion-Detection-and-Classification-using-Explainable-XAI-Machine-LearningThe continuing increase of Internet of Things (IoT) based networks have increased the need for Computer networks intrusion detection sys…☆57Updated 4 years ago
- ramyaelineni5 / ML-based-Network-Intrusion-Detection-using-Cyber-Dataset-CSE-CIC-IDS2018-to-classify-network-attacks☆43Updated 4 years ago
- Repository for IEEE CCNC'21 paper titled "Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network".☆48Updated 2 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 3 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Updated 5 years ago
- Network System Intrusion Detection using Graph Neural Networks☆20Updated 2 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆12Updated 5 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆38Updated 5 years ago
- ☆94Updated 2 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆45Updated 6 years ago
- Our implementations of the flow-based network intrusion detection model (for the COMNET paper)☆48Updated 5 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆33Updated 2 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆184Updated 4 years ago
- Intrusion Detection Based on Convolutional Neural Network with kdd99 data set☆56Updated 6 years ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆27Updated 5 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆65Updated 5 years ago