srtk88 / Machine-learning-algorithms-for-detecting-network-attacks-with-UNSW-NB15-data-setView on GitHub
Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different fields around the world. Many studies and researches about cyber-security are carried out by experts in order to construct a safe network environment for people. The aim of the work is to build the detection mo…
☆30Oct 30, 2018Updated 7 years ago
Alternatives and similar repositories for Machine-learning-algorithms-for-detecting-network-attacks-with-UNSW-NB15-data-set
Users that are interested in Machine-learning-algorithms-for-detecting-network-attacks-with-UNSW-NB15-data-set are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".☆39May 5, 2017Updated 9 years ago
- IoT intrusion Detection Model based on neural network and random forests☆50Oct 16, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- clean data ,feature selection , svm based kdd99☆27Oct 18, 2019Updated 6 years ago
- deep learning applied to Network Intrusion Detection with NSL-KDD data☆16Feb 3, 2018Updated 8 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- 这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。☆52Aug 10, 2020Updated 5 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆771May 8, 2019Updated 7 years ago
- Basic Machine learning projects and assignments done by me.☆34Aug 12, 2020Updated 5 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- using machine-learning to detecte instruction☆30Oct 21, 2019Updated 6 years ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆77Oct 20, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- 修改谷歌提供的样例量子卷积神经网络模型,基 于KDD99数据集进行训练,实现了网络攻击分类检测。☆39Jan 27, 2022Updated 4 years ago
- Machine Learning and Deep Learning models for Anomaly Detection☆10Mar 10, 2019Updated 7 years ago
- Advanced detection of port scanning, DoS and malware attacks using Machine Learning techniques☆14May 18, 2023Updated 2 years ago
- Machine Learning Algorithms on NSL-KDD dataset☆97May 30, 2019Updated 6 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- The given information of network connection, model predicts if connection has some intrusion or not. Binary classification for good and b…☆11Aug 10, 2019Updated 6 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆225Apr 25, 2024Updated 2 years ago
- CICIDS2017 dataset☆70Jan 4, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack …☆17Apr 8, 2024Updated 2 years ago
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- Sequence-based protein solubility predictor☆11Apr 1, 2020Updated 6 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆94Oct 18, 2019Updated 6 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- In this repository, DDOS attacks were detected using Recurrent Neural Networks (LSTM) and Classical Machine Learning Algorithms.☆19Jun 28, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆53Aug 10, 2023Updated 2 years ago
- DNP3 Cyber-attack datasets☆16Mar 9, 2017Updated 9 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Graphical simulator for LoRa with Markov Chains as models☆12Jan 24, 2022Updated 4 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 10 years ago
- yielding's portable code☆17Apr 10, 2026Updated 3 weeks ago