Zero day attack detection AI model based on seq2seq autoencoder
☆11May 31, 2022Updated 3 years ago
Alternatives and similar repositories for ZeroDay_WebAttack_Detection
Users that are interested in ZeroDay_WebAttack_Detection are comparing it to the libraries listed below
Sorting:
- Web Attacks Detection based on CNN☆17Apr 6, 2019Updated 6 years ago
- ☆16Dec 30, 2023Updated 2 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets☆23May 13, 2022Updated 3 years ago
- ☆10Mar 7, 2023Updated 3 years ago
- 福州大学信息安全修读资源助手库☆12Sep 6, 2020Updated 5 years ago
- Sensors library for proteus simulation software☆29Jun 5, 2021Updated 4 years ago
- 此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu☆16Feb 6, 2023Updated 3 years ago
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 6 years ago
- ☆22Oct 22, 2024Updated last year
- ☆12Nov 11, 2022Updated 3 years ago
- My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP request…☆26Mar 5, 2024Updated 2 years ago
- AMC-IoT: Automatic Modulation Classification Using Efficient Convolutional Neural Networks for Low Power IoT Devices☆14Jul 13, 2021Updated 4 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Mar 21, 2022Updated 4 years ago
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- The Swiss army knife for CRS developers☆13Mar 11, 2026Updated last week
- Whitepaper for the coraza-server implementation☆11Mar 16, 2022Updated 4 years ago
- Source code for paper "Multi-Classification In-Vehicle Intrusion Detection System using Packet- and Sequence-Level Characteristics from T…☆42Apr 17, 2025Updated 11 months ago
- Detection of copy-move forgeries in images using image-signal representation methods☆11Apr 28, 2018Updated 7 years ago
- Code for the IEEE IoTJ paper "Semi-Supervised Federated Learning Based Intrusion Detection Method for Internet of Things"☆33Dec 18, 2022Updated 3 years ago
- CNN+KAN architecture on MNIST (Val Acc: 96%)☆13May 4, 2024Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- A PyTorch implementation of of Anomal-E.☆42Dec 16, 2022Updated 3 years ago
- This is a Python tool to employ stratified sampling or treatment randomization with uneven numbers in some strata using pandas. Mainly th…☆17Mar 2, 2026Updated 3 weeks ago
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆16Feb 19, 2025Updated last year
- 简单的客户端高并发框架☆13Sep 28, 2018Updated 7 years ago
- Source code for AAAI 2021 paper "A Supervised Multi-Head Self-Attention Network for Nested Named Entity Recognition""☆16Jun 16, 2021Updated 4 years ago
- add length func base on go 1.9 sync.map .☆14Dec 27, 2018Updated 7 years ago
- ☆25Apr 23, 2022Updated 3 years ago
- Reproduced Code for Image Forgery Detection papers.☆22Sep 22, 2021Updated 4 years ago
- This is the first part of a TDOA-system used for estimating the time differences.☆17Feb 18, 2015Updated 11 years ago
- The project aims to analyse different types of attacks using the Bot-IoT dataset and also apply & compare different classification algori…☆11Oct 19, 2021Updated 4 years ago
- LSTM and MLP for sql injection detection☆26Dec 9, 2018Updated 7 years ago
- This repo is used for generating faking labeled positive videos for SVD dataset.☆10Aug 16, 2020Updated 5 years ago
- Using GreyWolfOptimization for feature selection and multi kernel SVM for classification for Malware Hunting on IoT devices☆45Feb 14, 2021Updated 5 years ago
- ☆100Nov 25, 2023Updated 2 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆17Nov 24, 2022Updated 3 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago