Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.
☆171Nov 6, 2025Updated 5 months ago
Alternatives and similar repositories for Intrusion-and-anomaly-detection-with-machine-learning
Users that are interested in Intrusion-and-anomaly-detection-with-machine-learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Full pipeline for log analysis and anomaly detection.☆18Feb 11, 2020Updated 6 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆94Oct 18, 2019Updated 6 years ago
- Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)☆19Jul 9, 2019Updated 6 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆297Dec 22, 2023Updated 2 years ago
- Log Anomaly Detection - Machine learning to detect abnormal events logs☆347Apr 21, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆17Apr 3, 2020Updated 6 years ago
- Using Unsupervised methods to identify anomalies in user behaviour through IP Profiling☆24Jul 28, 2019Updated 6 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- ☆13Jun 15, 2025Updated 10 months ago
- A machine learning toolkit for log-based anomaly detection [ISSRE'16]☆1,413Apr 24, 2024Updated last year
- Evading Snort Intrusion Detection System.☆77Sep 18, 2021Updated 4 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- AI: Autoencoder for HTTP Log Anomaly Detection☆15Jan 20, 2019Updated 7 years ago
- A list of awesome research on log analysis, anomaly detection, fault localization, and AIOps☆793Dec 31, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Mar 13, 2016Updated 10 years ago
- 基于机器学习的入侵检测系统☆84Feb 1, 2020Updated 6 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆225Apr 25, 2024Updated last year
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆49Jun 13, 2024Updated last year
- 数据库敏感信息扫描☆12Feb 18, 2021Updated 5 years ago
- ☆17Mar 27, 2025Updated last year
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Mar 4, 2022Updated 4 years ago
- 这是一个二分类的决策树系统,用于识别一个网站是否为钓鱼网站☆13Feb 18, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 7 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Dec 20, 2019Updated 6 years ago
- Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.☆28Jun 25, 2019Updated 6 years ago
- Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGB…☆582Apr 1, 2026Updated 2 weeks ago
- High performance, attack detection from web server logs.☆11May 16, 2019Updated 6 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- simple network signature/rule intrusion detection system written in Python.☆15Jun 10, 2024Updated last year
- ☆12Jun 11, 2021Updated 4 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆90Jan 24, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆202Apr 21, 2023Updated 2 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆175Dec 15, 2019Updated 6 years ago
- Python Project☆10Apr 11, 2018Updated 8 years ago
- With the rapid adoption of smartphones, tablets, and mobile apps, they are increasingly becoming part of children’s daily life for amusem…☆12Apr 7, 2017Updated 9 years ago
- Host log detection based on deep learning 基于LSTM神经网络模型的日志异常检测☆92Dec 8, 2022Updated 3 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- Ensemble code for Resnet in Tensorflow slim☆13Nov 16, 2016Updated 9 years ago