Intrusion detection system with Apache Spark and deep learning
☆18Mar 14, 2019Updated 7 years ago
Alternatives and similar repositories for Intrusion-Detection-Spark-Conv-LSTM
Users that are interested in Intrusion-Detection-Spark-Conv-LSTM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 6 years ago
- Deep Learning Tool for Off-line Network Intrusion Detection System☆23Oct 15, 2018Updated 7 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- CSE-CIC-IDS-2018 analyze with Random Forest☆30Apr 4, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Feb 24, 2022Updated 4 years ago
- DEPRECATED, please use upstream at @sjtug☆13Dec 26, 2017Updated 8 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- "Help us understand how geography affects virality."☆10May 27, 2020Updated 5 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- PySpark solution to the KDDCup99☆100Jun 20, 2016Updated 9 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- Notebook to integrate GPT4ALL with Llamaindex. Colab Pro high GPU resource needed.☆13Apr 14, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Implementation of Online Hedge Backpropagation☆52Jun 20, 2018Updated 7 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- Combination Robust Cut Forests: Merging Isolation Forests and Robust Random Cut Forests☆14Aug 9, 2023Updated 2 years ago
- Image similarity estimation using a Siamese Network with a triplet loss☆11Jul 27, 2023Updated 2 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆13Jun 21, 2021Updated 4 years ago
- SHMnet: Condition Assessment of Bolted Connection with Beyond Human-level Performance☆13Oct 31, 2019Updated 6 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- BERT is a dataset that presents vibration tests performed on an aluminum beam with a bolted joint with various tightening torques and hys…☆16Apr 13, 2021Updated 4 years ago
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆55Apr 9, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Codes for Stackelberg GAN☆15Apr 23, 2019Updated 6 years ago
- ☆13Oct 7, 2022Updated 3 years ago
- ☆12Jan 1, 2020Updated 6 years ago
- Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)☆19Jul 9, 2019Updated 6 years ago
- ☆13Jun 15, 2025Updated 9 months ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- ☆11Nov 26, 2019Updated 6 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- tcp pcap to weka☆20Mar 5, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 极简版上海交大课程作业LaTex模板(支持多作者)。A XeLaTeX template of TERM PAPER or PROJECT for Shanghai Jiao Tong University (SJTU) students.☆21Dec 30, 2019Updated 6 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆272Apr 5, 2020Updated 5 years ago
- Containerized Implementation of LightChain Blockchain (research project)☆12Jun 28, 2021Updated 4 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- Network exploit detection using highly accurate pre-trained deep neural networks with Celery + Keras + Tensorflow + Redis☆22Dec 7, 2018Updated 7 years ago
- A pytorch implementation of https://arxiv.org/abs/1904.09925☆16Jun 10, 2019Updated 6 years ago
- AlgorithmeConcensus☆12Jan 15, 2019Updated 7 years ago