This project aims to analyze and classify a real network traffic dataset to detect malicious/benign traffic records. It compares and tunes the performance of several Machine Learning algorithms to maintain the highest accuracy and lowest False Positive/Negative rates.
☆25May 1, 2024Updated 2 years ago
Alternatives and similar repositories for ml-classification-malicious-network-traffic
Users that are interested in ml-classification-malicious-network-traffic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jul 28, 2024Updated last year
- os lectures 2022 spring☆10Aug 25, 2025Updated 8 months ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated 2 years ago
- ☆29Aug 6, 2023Updated 2 years ago
- code for infocom 2021 paper MANDA☆11May 30, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Work in progress about activity recognition/prediction using wearable sensors information☆16Sep 18, 2020Updated 5 years ago
- In-the-wild deepfake detection dataset☆14Mar 5, 2025Updated last year
- ☆19Jan 2, 2025Updated last year
- ☆16Oct 18, 2023Updated 2 years ago
- 北京邮电大学学士学位论文Word模 板☆18Oct 8, 2024Updated last year
- ☆12Jan 26, 2019Updated 7 years ago
- ☆18Mar 30, 2025Updated last year
- ☆14Aug 7, 2025Updated 8 months ago
- Windows running repository of the pix2surf code of the paper "Learning to Transfer Texture from Clothing Images to 3D Humans"☆19Jun 12, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Mousika: Enable General In-Network Intelligence in Programmable Switches by Knowledge Distillation (INFOCOM22 & ToN23)☆43Jun 19, 2023Updated 2 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Jigsaw puzzle solver☆13Apr 26, 2020Updated 6 years ago
- An infinite canvas with image generation. Try it: https://image-generation-ui.vercel.app/☆25Jun 15, 2024Updated last year
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- This is the source code for [SLADE: Detecting Dynamic Anomalies in Edge Streams without Labels via Self-Supervised Learning]☆17Jul 17, 2024Updated last year
- IntSight: Diagnosing SLO Violations with In-Band Network Telemetry☆14Aug 22, 2022Updated 3 years ago
- code space of paper "Safety Layers in Aligned Large Language Models: The Key to LLM Security" (ICLR 2025)☆24Apr 26, 2025Updated last year
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆30Aug 19, 2025Updated 8 months ago
- ☆12Jun 7, 2025Updated 10 months ago
- Code repo of our paper Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis (https://arxiv.org/abs/2406.10794…☆24Jul 26, 2024Updated last year
- A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.☆58Apr 27, 2026Updated last week
- ☆11Oct 7, 2023Updated 2 years ago
- TrOCR but 2 to 3 times faster☆11Oct 22, 2022Updated 3 years ago
- [IEEE TCYB 2024] CTNet: Contrastive Transformer Network for Polyp Segmentation☆41Mar 19, 2025Updated last year
- ☆11Mar 31, 2026Updated last month
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 在线迁移学习算法实现☆24Mar 11, 2019Updated 7 years ago
- A small application that enable to detect fake or retake face photo☆21Apr 27, 2021Updated 5 years ago
- A Sparse-tensor Communication Framework for Distributed Deep Learning☆13Nov 1, 2021Updated 4 years ago
- The goal of this repo is to become a benchmark for pentesting☆22Oct 25, 2024Updated last year
- WhaleSearch 🐳 - semantic search engine. (SSE)☆16Jan 4, 2025Updated last year
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago