Machine learning model for detecting DDoS attacks, CIC-DDoS2019 dataset
☆23Nov 25, 2024Updated last year
Alternatives and similar repositories for CIC-DDoS2019-ML-Detection
Users that are interested in CIC-DDoS2019-ML-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆18Jun 18, 2024Updated last year
- ☆11Oct 7, 2023Updated 2 years ago
- ☆15Feb 26, 2025Updated last year
- Encrypted Traffic Classification at Line Rate in Programmable Switches with Machine Learning☆20Feb 2, 2026Updated 3 months ago
- SDN networks (Software Defined Networking ) are exposed to new security threats and attacks, especially Distributed Denial of Service (…☆226Mar 22, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆26Jul 6, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)☆31Aug 2, 2023Updated 2 years ago
- ☆12Jun 19, 2024Updated last year
- Analyze traffic flow with YOLOv8 and ByteTrack: Vehicle detection and tracking, speed estimation, path outlining, and direction analysis …☆21Jan 12, 2024Updated 2 years ago
- ☆31Apr 11, 2022Updated 4 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- 口诀生成器、顺口溜生成器,辅助记忆背诵。关键词的词头按照词义重组。☆14Mar 28, 2025Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- 这个仓库包含了我在上人工智能课时完成的拼音输入法作业。☆11Feb 16, 2022Updated 4 years ago
- A Python library for processing and filtering TabLib☆14Aug 24, 2024Updated last year
- Code for "LLM Embeddings Improve Test-time Adaptation to Tabular Y|X-Shifts"☆12Oct 17, 2024Updated last year
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆11Aug 7, 2023Updated 2 years ago
- The official implementation for Common Sense Enhanced Knowledge-based Recommendation with Large Language Model☆15Apr 21, 2024Updated 2 years ago
- ☆40Jan 14, 2025Updated last year
- [ICML'25] "Rethinking Addressing in Language Models via Contextualized Equivariant Positional Encoding" by Jiajun Zhu, Peihao Wang, Ruisi…☆15Jun 6, 2025Updated 11 months ago
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Datasets for cybersecurity☆18Aug 12, 2025Updated 8 months ago
- ☆13Nov 20, 2023Updated 2 years ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- [NeurIPS 2023] Code base for the Renyi Kernel Entropy (RKE) metric for generative models.☆13Jun 18, 2025Updated 10 months ago
- ☆18Jul 17, 2025Updated 9 months ago
- DDOS Mitigation System based on Ryu SDN Controller with Port Blocking Mechanism☆27Jun 6, 2023Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆65Aug 14, 2020Updated 5 years ago
- The open source implementation of the multi grouped query attention by the paper "GQA: Training Generalized Multi-Query Transformer Model…☆16Dec 11, 2023Updated 2 years ago
- Code for the CVPR '23 paper, "Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning"☆10Jun 9, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆34Sep 19, 2025Updated 7 months ago
- 基于强化学习的异构感知高能效联邦学习调度系统☆14Apr 13, 2024Updated 2 years ago
- ☆13Aug 8, 2024Updated last year
- Implemented entropy-based detection using Python to allow POX controller to detect UDP Flood Attack in the simulated networks using Minin…☆22Dec 18, 2018Updated 7 years ago
- A tunneled flooding traffic detection system.☆31Dec 3, 2024Updated last year
- The first range filter to simultaneously offer dynamicity, fast operations, and a robust false positive rate for any workload.☆12Jul 15, 2025Updated 9 months ago
- GWO☆12Nov 16, 2019Updated 6 years ago