deep learning applied to Network Intrusion Detection with NSL-KDD data
☆16Feb 3, 2018Updated 8 years ago
Alternatives and similar repositories for deepIDS
Users that are interested in deepIDS are comparing it to the libraries listed below
Sorting:
- wx☆11Aug 14, 2022Updated 3 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- Using NSL_KDD data☆28Mar 3, 2019Updated 6 years ago
- Unofficial repo of the research paper ”An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units“. Developed u…☆31Dec 26, 2019Updated 6 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆88Dec 27, 2023Updated 2 years ago
- Neural Network based Intrusion Detection System (NIDS) on Intrusion Detection Evaluation Dataset (CICIDS2017)☆13Aug 16, 2020Updated 5 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆271Apr 5, 2020Updated 5 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆41Sep 27, 2018Updated 7 years ago
- 使用贝叶斯、神经网络、KNN进行入侵检测(KDD-CUP99)☆81Jul 1, 2020Updated 5 years ago
- Intrusion detection system with Apache Spark and deep learning☆18Mar 14, 2019Updated 6 years ago
- ☆16Jan 5, 2018Updated 8 years ago
- Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)☆19Jul 9, 2019Updated 6 years ago
- This clustering based anomaly detection project implements unsupervised clustering algorithms on the NSL-KDD and IDS 2017 datasets☆59Dec 5, 2019Updated 6 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆52Aug 10, 2020Updated 5 years ago
- Intrusion detection system using CNN and RNN☆25Sep 23, 2019Updated 6 years ago
- Analysis and preprocessing of the kdd cup 99 dataset using python and scikit-learn☆22Mar 11, 2020Updated 5 years ago
- Using PyTorch to train kddcup99 dataset with convolutional neural networks.☆54Apr 9, 2019Updated 6 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆27Jan 6, 2020Updated 6 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- Just a single binary no config file Chromium(64bit) updater.☆11May 5, 2018Updated 7 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- Deep learning models for network intrusion detection☆40Mar 24, 2023Updated 2 years ago
- CUMT 计算机科学与技术 2016版培养方案 课程资源☆10Sep 7, 2022Updated 3 years ago
- SMOTE-BD: A distributed Synthetic Minority Oversampling Technique (SMOTE) for Big Data.☆10Apr 1, 2019Updated 6 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- Bot software for creating Wikipedia articles using geographical data☆10Feb 28, 2017Updated 9 years ago
- Cryptographic Asymmetric Secure Storage Infrastructure☆10Jan 6, 2023Updated 3 years ago
- A machine learning based Intrusion Detection System☆166Dec 11, 2019Updated 6 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Lilac初学者指南☆10Mar 17, 2019Updated 6 years ago
- A Ruby gem that calculates Gematria☆10Mar 15, 2013Updated 12 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- Repository for service oriented architecture code and components.☆18Aug 28, 2017Updated 8 years ago
- Rule check for Adblock filter. Mirror of https://arestwo.org/famlam/redundantRuleChecker.html (might be disappear soon). Now avaiable at …☆11Nov 28, 2025Updated 3 months ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Faster manipulation of dendrogram objects in R.☆15May 22, 2015Updated 10 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- Julia package for representing linear, time-invariant system models and operations defined on them.☆10Oct 18, 2019Updated 6 years ago