IDS Alert Prioritization INSuRE Research Project
☆19Jun 16, 2019Updated 6 years ago
Alternatives and similar repositories for DSU_INSuRE_SP19_IDS_Prioritization
Users that are interested in DSU_INSuRE_SP19_IDS_Prioritization are comparing it to the libraries listed below
Sorting:
- CSE-CIC-IDS-2018 analyze with Random Forest☆30Apr 4, 2021Updated 4 years ago
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- implementation of BiGAN model using tensorflow☆16Oct 2, 2018Updated 7 years ago
- PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html☆128Sep 8, 2020Updated 5 years ago
- Machine Learning Based - Intrusion Detection System☆32Jun 21, 2022Updated 3 years ago
- ☆31Mar 2, 2018Updated 8 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".☆38May 5, 2017Updated 8 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- 自习室预约小程序就是用户在使用小程序在线订场服务,在小程序中,可以直观的看到自习室的预约情况、预约费用,然后在线缴付订金。还可以邀请小伙伴一起组队,只需要几分钟就能完成整个预约过程。有了自习室小程序,要查看附近有哪些自习室,直接在微信打开附近的小程序,周边自习室一览无遗;想…☆14Sep 29, 2022Updated 3 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- Patches for VoIPER http://sourceforge.net/projects/voiper/ to better support client fuzzing☆19Sep 29, 2015Updated 10 years ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- An adaptive URL online checker for python2 and python3☆10Aug 10, 2018Updated 7 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- MATLAB code of ANFIS implementation. In this code, ANFIS is trained by PSO for solving Iris Classification Problem☆10Mar 27, 2018Updated 7 years ago
- Deterministic and monitored traffic generation for inspecting and and training traffic models☆12Nov 19, 2024Updated last year
- ☆12Jun 8, 2017Updated 8 years ago
- A Python notebook showcasing the use of Machine Learning for the task of bot detection, with an emphasis on e-commerce sites.☆14Jul 8, 2021Updated 4 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆762May 8, 2019Updated 6 years ago
- Two staged IDS specific to IoT networks where Signature based IDS and Anomaly based IDS which is trained and classified using machine lea…☆45Jun 3, 2019Updated 6 years ago
- Fuzzy logic library for python☆14Jun 22, 2022Updated 3 years ago
- IoT intrusion Detection Model based on neural network and random forests☆48Oct 16, 2018Updated 7 years ago
- We use attention model for intrusion detection. The idea of Hierarchical Attention Model for Intrusion Detection comes from the applicat…☆12Jul 4, 2020Updated 5 years ago
- Research on cybersecurity data usage in research papers☆13Dec 15, 2017Updated 8 years ago
- The binary classification problem focused on first IEEE Image forensics challenge-phase 1, to predict the given image is pristine or mani…☆14Aug 10, 2019Updated 6 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆17Jul 20, 2022Updated 3 years ago
- Steganography via adversarial training☆15Dec 1, 2018Updated 7 years ago
- Must-read papers on network representation learning (NRL) / network embedding (NE)☆14Mar 14, 2019Updated 6 years ago
- P4-network-slices-A: Using P4 to slice the substrate network.☆12Nov 4, 2017Updated 8 years ago
- Base modules of the Nemea system. This repository contains modules for export, replay, filtering, merging etc.☆17Sep 30, 2025Updated 5 months ago
- ☆15Jul 20, 2020Updated 5 years ago
- ☆18Aug 10, 2021Updated 4 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆20Jul 8, 2020Updated 5 years ago
- Mininet setup for playing around with static multicast routing☆15Jul 22, 2018Updated 7 years ago
- Official repository for the paper "Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Ne…☆15Jul 31, 2024Updated last year