Developed an Anomaly-based intrusion detection system using Multi Level Perceptron
☆19Dec 13, 2020Updated 5 years ago
Alternatives and similar repositories for Intrusion-Detection-Deep-Learning
Users that are interested in Intrusion-Detection-Deep-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intrusion Detection System using Machine Learning and Deep Learning☆89Dec 27, 2023Updated 2 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆173Dec 15, 2019Updated 6 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- ☆25Mar 13, 2021Updated 5 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆199Apr 21, 2023Updated 2 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆198Sep 8, 2021Updated 4 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- ☆23May 15, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- suricata rules☆18Dec 26, 2024Updated last year
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆41Sep 4, 2016Updated 9 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- A HYBRID APPROACH TO ANOMALY DETECTION USING FUZZY LOGIC TUNED WITH EVOLUTIONARY ALGORITHMS☆16Dec 12, 2014Updated 11 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- ☆11May 1, 2021Updated 4 years ago
- ☆23Jan 4, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- Notebooks exploring the Canadian Institute of Cybersecurity's IoT dataset.☆11Mar 6, 2024Updated 2 years ago
- Polynomial arithmetic over GF2☆12Oct 30, 2018Updated 7 years ago
- Convolutional Neural Network (CNN) was trained on 48x48 pixel grayscale images to predict 5 different emotions from images. Ten different…☆11Sep 21, 2022Updated 3 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆26Nov 16, 2023Updated 2 years ago
- Code accompanying our ICML 2020 paper on choice set optimization in group decision-making.☆10Jun 27, 2020Updated 5 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 3 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆13Jun 15, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Generalised and highly customisable, hybrid-parallelism, database based, deep learning framework.☆18May 2, 2020Updated 5 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- ☆12Jan 26, 2019Updated 7 years ago
- A toy implementation about Program Dependence Graph using LLVM☆13Sep 27, 2023Updated 2 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 10 years ago
- tcp pcap to weka☆20Mar 5, 2017Updated 9 years ago
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago