saptajitbanerjee / SQL-Injection-Detection
My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP requests, extracting essential features for training the model effectively. It enhances web application security by accurately identifying and flagging SQL Injection attacks.
☆19Updated last year
Alternatives and similar repositories for SQL-Injection-Detection:
Users that are interested in SQL-Injection-Detection are comparing it to the libraries listed below
- A custom GUI based NIDS (Network Intrusion Detection System) with stream follow capability for HTTP2 and TLS/TCP☆11Updated 6 months ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning, Recurrent Neural Netwo…☆15Updated last year
- AI & Machine Learning: Detection and Classification of Network Traffic Anomalies based on IoT23 Dataset☆69Updated 3 years ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆50Updated last year
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web …☆16Updated 11 months ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆41Updated last year
- Welcome this is a comprehensive repository dedicated to advancing Network Intrusion Detection Systems (NIDS) through the power of Machine…☆20Updated 3 months ago
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆49Updated last year
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆25Updated 2 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆13Updated 2 years ago
- Machine Learning in Cybersecurity☆79Updated 5 months ago
- An intrusion detection system (IDS) based on machine learning technique, specifically the anomaly detection algorithm.☆21Updated 4 years ago
- ☆27Updated 2 years ago
- The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.☆61Updated 4 years ago
- Journal Article: Telematics and Informatics Reports☆11Updated last year
- Thesis research on enhancing Network Intrusion Detection System (NIDS) explainability using Transformers.☆14Updated last year
- 论文:A Deep Hierarchical Network for Packet-Level Malicious Traffic Detection的源代码☆23Updated 2 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆12Updated 4 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆204Updated 11 months ago
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆99Updated 2 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆12Updated 4 years ago
- 在当前的数字时代,随着网络攻击日益复杂和频繁,网络安全成为了保障信息安全的重中之重。尤其是在网络入侵检测领域,传统的基于规则的检测方法已经难以应对日新月异的攻 击技术。因此,利用深度学习技术进行网络入侵检测成为了研究的新趋势。本项目旨在开发一种基于卷积神经网络(CNN)和Tr…☆21Updated 11 months ago
- CNN网络入侵检测☆53Updated 11 months ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆13Updated 2 years ago
- It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Pyt…☆164Updated last year
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆43Updated 2 years ago
- Network Intrusion Detection based on various machine learning and deep learning algorithms using UNSW-NB15 Dataset☆163Updated 3 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆86Updated last year
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Updated 6 years ago
- ☆24Updated 5 years ago