Machine learning model for detecting DDoS attacks, CIC-DDoS2019 dataset
☆22Nov 25, 2024Updated last year
Alternatives and similar repositories for CIC-DDoS2019-ML-Detection
Users that are interested in CIC-DDoS2019-ML-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆18Jun 18, 2024Updated last year
- Privacy-Preserving Verifiable Neural Network Inference Service☆16Sep 6, 2025Updated 7 months ago
- ☆11Oct 7, 2023Updated 2 years ago
- ☆14Feb 26, 2025Updated last year
- Detailed Comparative analysis of DDoS detection using Machine Learning Models☆31Jun 14, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A machine learning program, that detects denial of service attack using machine learning technique.☆25Sep 20, 2019Updated 6 years ago
- A Simple API for blocking IP addresses using XDP/eBPF☆16Nov 25, 2022Updated 3 years ago
- ☆26Jul 6, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆31Aug 2, 2023Updated 2 years ago
- ☆12Jun 19, 2024Updated last year
- In-network detection of network attacks using Random Forests and P4☆28Dec 22, 2023Updated 2 years ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 根据语法规则生成模拟句子☆12Jan 21, 2019Updated 7 years ago
- This repository contains the implementation of a DDOS attack detection system using a Software-Defined Networking (SDN) network.☆17Jun 5, 2023Updated 2 years ago
- Another Wheel to parse json☆11Mar 13, 2020Updated 6 years ago
- 这个仓库包含了我在上人工智能课时完成的拼音输入法作业。☆11Feb 16, 2022Updated 4 years ago
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆11Aug 7, 2023Updated 2 years ago
- Code for "LLM Embeddings Improve Test-time Adaptation to Tabular Y|X-Shifts"☆12Oct 17, 2024Updated last year
- A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection☆158Dec 5, 2023Updated 2 years ago
- ☆38Jan 14, 2025Updated last year
- ☆12Nov 20, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 词、句拼音转汉字、拼音分割、拼音补全、pygame输入中文☆15Mar 21, 2020Updated 6 years ago
- SimCSE☆15Oct 1, 2022Updated 3 years ago
- This repo contains the codes and the notebooks used for the paper "DarkVec: Automatic Analysis of Darknet Traffic with Word Embeddings".☆13Feb 3, 2024Updated 2 years ago
- TCP SYN Flood DDoS Detection using Machine Learning☆21Mar 10, 2022Updated 4 years ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- Datasets for cybersecurity☆16Aug 12, 2025Updated 8 months ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- ☆23Feb 24, 2023Updated 3 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆66Aug 14, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The open source implementation of the multi grouped query attention by the paper "GQA: Training Generalized Multi-Query Transformer Model…☆15Dec 11, 2023Updated 2 years ago
- Code for the CVPR '23 paper, "Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning"☆10Jun 9, 2023Updated 2 years ago
- ☆33Sep 19, 2025Updated 7 months ago
- Run HTTP and HTTPS traceroutes to detect the network location of censoring middleboxes☆18Mar 30, 2023Updated 3 years ago
- ☆13Aug 8, 2024Updated last year
- Implemented entropy-based detection using Python to allow POX controller to detect UDP Flood Attack in the simulated networks using Minin…☆22Dec 18, 2018Updated 7 years ago
- ☆14Jul 24, 2024Updated last year