Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.
☆18May 10, 2023Updated 2 years ago
Alternatives and similar repositories for Deep-Learning-Evaluation-of-IDS-Datasets
Users that are interested in Deep-Learning-Evaluation-of-IDS-Datasets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.☆13May 12, 2021Updated 4 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A fully featured platform that detect clothing size and continuously recommends clothing tailored to the user's liking☆10Aug 9, 2023Updated 2 years ago
- An attempt to predict stock market volatility, return and trading volume of tech stocks using Semantic Vectors and Google Trends, which r…☆13May 17, 2017Updated 8 years ago
- Python-based JA3 Generation Server☆13Mar 29, 2020Updated 6 years ago
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Oct 18, 2025Updated 5 months ago
- 运行图显示程序☆13Oct 12, 2021Updated 4 years ago
- This project showcases a big data processing pipeline for cryptocurrency data using Hadoop, Spark Streaming, Kafka, MongoDB, and a React …☆12May 10, 2023Updated 2 years ago
- ☆10Apr 27, 2021Updated 4 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago
- JJU网络安全靶场实训平台☆18May 1, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- By using python 3.6 and google recognizer and ffmpeg it will convert video file like mp4 to audio file like mp3 and also convert 3gp file…☆13Jan 30, 2019Updated 7 years ago
- DISEÑO Y EVALUACIÓN DE REDES NEURONALES CONVOLUCIONALES PARA UN SISTEMA DE DETECCIÓN DE INTRUSIONES☆14Jun 14, 2020Updated 5 years ago
- Train schedule diagrams of Japanese railways☆13Mar 17, 2025Updated last year
- Simple task offloading client to offload HTTP requests to edge servers☆10Dec 8, 2022Updated 3 years ago
- 画出列车运行图,给出列车运行的最佳调度☆15Mar 9, 2020Updated 6 years ago
- Blockchain reputation-based trust management system☆17Jul 14, 2019Updated 6 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆52Apr 9, 2020Updated 5 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- NSL-KDD (for network-based intrusion detection systems (IDS)) is a dataset suggested to solve some of the inherent problems of the parent…☆12Feb 11, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- IoT intrusion Detection Model based on neural network and random forests☆48Oct 16, 2018Updated 7 years ago
- IoV Reputation Mechanism simulation using SUMO, OMNETPP and VEINS.☆17Aug 8, 2020Updated 5 years ago
- Myntra 'HackerRamp: WeForShe' hackathon's pre-finale submission 'V-Shop' is a communicative web application which will facilitate the use…☆12Jan 17, 2022Updated 4 years ago
- Trust management model in IoT☆16Oct 11, 2021Updated 4 years ago
- ☆43Dec 26, 2020Updated 5 years ago
- ☆23Jan 4, 2021Updated 5 years ago
- My introduction project to the Ethereum Blockchain, Solidity, and Smart Contracts.☆17Sep 12, 2021Updated 4 years ago
- Simulating communication in a VANET (Vehicular Ad-Hoc Networks), and implementing access control, using concepts from blockchains, mainta…☆16Apr 29, 2022Updated 3 years ago
- A trust inference model on the hyperledger that is attack proof for communication in ephemeral networks such as vehicular adhoc networks …☆17Sep 4, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Detect and report Obscene contents on the Internet directly from your browser with Deep-Learning models.☆12Jul 13, 2023Updated 2 years ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated last year
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆122Oct 25, 2022Updated 3 years ago
- Malicious URL Detection Using Deep Learning.☆15Jul 3, 2023Updated 2 years ago
- The dataset that has been processed and the code used to process it☆17Jun 15, 2022Updated 3 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- Codes for the paper entitled "Optimization of Predictive Performance of Intrusion Detection System Using Hybrid Ensemble Model for Secure…☆16May 29, 2023Updated 2 years ago