Final Year project based upon Network Intrusion Detection System
☆37Jul 10, 2019Updated 6 years ago
Alternatives and similar repositories for Network-based-Intrusion-Detection-Systems
Users that are interested in Network-based-Intrusion-Detection-Systems are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆41Sep 4, 2016Updated 9 years ago
- The case study on a Network-based Intrusion Detection System is a Machine Learning-based Web application based on https://arxiv.org/pdf/1…☆29Apr 3, 2022Updated 4 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆203Sep 8, 2021Updated 4 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆298Dec 22, 2023Updated 2 years ago
- A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".☆39May 5, 2017Updated 9 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 3 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machine…☆62Oct 31, 2025Updated 6 months ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Autoencoder approach to detect attacks/intrusions in a network☆10Mar 25, 2023Updated 3 years ago
- This Repository will be used by the Concordia Shanghai Swarm Team Club to share & work on different programs for the DJI TT Swarm Kit☆10Dec 19, 2021Updated 4 years ago
- Network Intrusion Detection System☆53Mar 11, 2026Updated last month
- The project aims to develop models that can forecast traffic congestion, aiding in effective traffic management and planning.☆12Aug 20, 2022Updated 3 years ago
- A HYBRID APPROACH TO ANOMALY DETECTION USING FUZZY LOGIC TUNED WITH EVOLUTIONARY ALGORITHMS☆16Dec 12, 2014Updated 11 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Jun 10, 2020Updated 5 years ago
- An IDS implementation using machine learning☆40Aug 5, 2017Updated 8 years ago
- An R package implementing the NetEMD and NetDis network comparison measures☆14Jun 9, 2022Updated 3 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆175Dec 15, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 10 years ago
- This repository includes supervised and unsupervised machine learning methods which are used to detect anomalies on network datasets. Dec…☆17Jun 24, 2019Updated 6 years ago
- ☆11Oct 3, 2021Updated 4 years ago
- The given information of network connection, model predicts if connection has some intrusion or not. Binary classification for good and b…☆11Aug 10, 2019Updated 6 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- ☆10Sep 17, 2015Updated 10 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- Inferring Strange Behavior from Connectivity Pattern (PAKDD 2014, KAIS 2015)☆11Mar 27, 2015Updated 11 years ago
- A python script to download APK files from apkpure.com☆13Apr 25, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 书籍、课程和文章汇总☆12Dec 14, 2022Updated 3 years ago
- An AI, Machine Learning and Blockchain based healthcare ecosystem that predicts health outcome, divulges users' and environmental health …☆13Feb 12, 2019Updated 7 years ago
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆46Apr 15, 2023Updated 3 years ago
- Outlier Detection to detect DNS Tunnelling☆11Oct 8, 2018Updated 7 years ago
- The project trains an Artificial Neural Network which can predict whether a visitor will generate revenue for the company or not.☆17May 13, 2019Updated 6 years ago
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆28Jun 25, 2019Updated 6 years ago
- Veins simulations of ad hoc vehicular networks.☆10Sep 5, 2017Updated 8 years ago