rdpahalavan / nids-datasetsView external linksLinks
Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)
☆30Aug 2, 2023Updated 2 years ago
Alternatives and similar repositories for nids-datasets
Users that are interested in nids-datasets are comparing it to the libraries listed below
Sorting:
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆18Sep 11, 2023Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆48Jul 12, 2024Updated last year
- ☆30Apr 11, 2022Updated 3 years ago
- ☆18Jan 2, 2025Updated last year
- ☆26Jul 6, 2023Updated 2 years ago
- Machine learning model for detecting DDoS attacks, CIC-DDoS2019 dataset☆22Nov 25, 2024Updated last year
- This platform is designed and implemented for encrypted traffic classification using deep learning☆18Oct 7, 2023Updated 2 years ago
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- Encrypted Traffic Classification at Line Rate in Programmable Switches with Machine Learning☆19Feb 2, 2026Updated last week
- Network System Intrusion Detection using Graph Neural Networks☆20Aug 1, 2023Updated 2 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆28Jan 6, 2020Updated 6 years ago
- Flowrest: in-switch flow-level classification with random forests☆35Feb 2, 2026Updated last week
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- ☆18Jul 17, 2025Updated 6 months ago
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆10Aug 7, 2023Updated 2 years ago
- configure different congestion control algorithms☆10Jun 14, 2021Updated 4 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆106Oct 19, 2023Updated 2 years ago
- ☆10Nov 15, 2023Updated 2 years ago
- Machine Learning in Cybersecurity☆90May 23, 2025Updated 8 months ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- An efficient implementation of a stochastic Spiking Neural Network for handwrittend digits recognition☆11Feb 27, 2019Updated 6 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- FL-based intrusion detection system development using model averaging.☆42Dec 18, 2022Updated 3 years ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆14Jan 22, 2025Updated last year
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- ☆13Jul 14, 2025Updated 7 months ago
- ☆16Mar 27, 2025Updated 10 months ago
- Modular, flexible, cross-platform workload profiling and characterization☆13Mar 1, 2021Updated 4 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 2 years ago
- Deep SNNs with various neural coding methods (rate, phase, burst, TTFS)☆11Feb 15, 2022Updated 3 years ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- 小米路由器3(三)刷老毛子固件☆13Mar 11, 2020Updated 5 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆56Nov 5, 2025Updated 3 months ago