shreyagopal / LSTM-Autoencoder-for-Network-Anomaly-DetectionLinks
Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.
☆14Updated 4 years ago
Alternatives and similar repositories for LSTM-Autoencoder-for-Network-Anomaly-Detection
Users that are interested in LSTM-Autoencoder-for-Network-Anomaly-Detection are comparing it to the libraries listed below
Sorting:
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆72Updated 4 years ago
- ramyaelineni5 / ML-based-Network-Intrusion-Detection-using-Cyber-Dataset-CSE-CIC-IDS2018-to-classify-network-attacks☆42Updated 4 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Updated 4 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆87Updated last year
- This project aims to detect the anomalies in Web-Traffic using a C-LSTM architecture.☆24Updated 5 years ago
- Cyber-attack classification in the network traffic database using NSL-KDD dataset☆26Updated 4 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆32Updated 6 years ago
- Synthesis of Adversarial DDos Attacks Using Tabular Generative Adversarial Networks☆10Updated 2 years ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆44Updated 2 years ago
- Deep learning models for network intrusion detection☆37Updated 2 years ago
- Generative adversarial networks for Network Intrusion Benchmark datasets☆35Updated 10 months ago
- Intrusion Detection System (Classifier) Using CIC IDS 2017 Datasets☆13Updated 4 years ago
- GAN / AUTOENCODER for network intrusion detection using NSL-KDD dataset: https://www.kaggle.com/datasets/hassan06/nslkdd☆18Updated 2 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Updated 5 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…