VGG-19 deep learning model trained using ISCX 2012 IDS Dataset
☆145Jan 5, 2019Updated 7 years ago
Alternatives and similar repositories for Intrusion-Detection-System-using-Deep-Learning
Users that are interested in Intrusion-Detection-System-using-Deep-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Intrusion Detection System using Deep Learning Techniques☆175Dec 15, 2019Updated 6 years ago
- I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.…☆40Sep 27, 2018Updated 7 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆296Dec 22, 2023Updated 2 years ago
- Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (K…☆102Sep 27, 2017Updated 8 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆273Apr 5, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆765May 8, 2019Updated 6 years ago
- IoT intrusion Detection Model based on neural network and random forests☆49Oct 16, 2018Updated 7 years ago
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Feb 5, 2024Updated 2 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆46Jun 3, 2019Updated 6 years ago
- Intrusion Detection System using Machine Learning and Deep Learning☆89Dec 27, 2023Updated 2 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆200Apr 21, 2023Updated 2 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- A machine learning based Intrusion Detection System☆169Dec 11, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- IDS Alert Prioritization INSuRE Research Project☆19Jun 16, 2019Updated 6 years ago
- ☆23Feb 9, 2022Updated 4 years ago
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆107Oct 1, 2022Updated 3 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆94Oct 18, 2019Updated 6 years ago
- A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach☆148Oct 12, 2021Updated 4 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆123Oct 25, 2022Updated 3 years ago
- Feature coded UNSW_NB15 intrusion detection data.☆90Jan 24, 2018Updated 8 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- ☆13Jun 15, 2025Updated 9 months ago
- Attention Model for Network Intrusion Detection☆19Jul 24, 2019Updated 6 years ago
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- Machine Learning Based - Intrusion Detection System☆33Jun 21, 2022Updated 3 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆382Mar 24, 2026Updated 3 weeks ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆171Nov 6, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Jun 10, 2020Updated 5 years ago
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".☆39May 5, 2017Updated 8 years ago
- [ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection☆174Mar 24, 2023Updated 3 years ago
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆37Mar 3, 2023Updated 3 years ago