vanlalruata / DDoS-attack-detection-and-mitigation-using-deep-neural-network-in-SDN-environmentView on GitHub
Computers & Security
☆20Oct 31, 2025Updated 4 months ago
Alternatives and similar repositories for DDoS-attack-detection-and-mitigation-using-deep-neural-network-in-SDN-environment
Users that are interested in DDoS-attack-detection-and-mitigation-using-deep-neural-network-in-SDN-environment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Combination of Software Defined Network (SDN) And A Multi-Layer Perceptron (MLP) Neural Network That Results In The Mitigation of DDoS …☆10Oct 21, 2025Updated 5 months ago
- Journal Article: International Journal of Information Technology☆13Jun 27, 2023Updated 2 years ago
- SDN networks (Software Defined Networking ) are exposed to new security threats and attacks, especially Distributed Denial of Service (…☆221Mar 22, 2025Updated last year
- Adaptive Pushback Mechanism for DDoS Detection and Mitigation employing P4 Data Planes☆23Jul 14, 2022Updated 3 years ago
- DDOS Mitigation System based on Ryu SDN Controller with Port Blocking Mechanism☆28Jun 6, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆18Jul 17, 2025Updated 8 months ago
- SDN NFV architecture for DDoS mitigation with reinforcement learning: An implementation with ONOS and Containernet☆10Sep 1, 2024Updated last year
- Journal Article: Telematics and Informatics Reports☆12Jun 18, 2023Updated 2 years ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- This repository contains the work done in completion of my final year project for the degree of Cyber Security BSc at the University of W…☆12May 20, 2022Updated 3 years ago
- This Repository contains the code to detect intrusions inside a network. The Intrusion detection system uses anomaly based method to dete…☆10Jul 9, 2018Updated 7 years ago
- Journal Article: IEEE Access☆20Oct 23, 2023Updated 2 years ago
- Final Year Project B.Tech CSE | Enhance your reading experience with Read For Speed, where learning meets velocity☆13Apr 29, 2024Updated last year
- 🕵️ IDS with accuracy rates of 94.4% for misuse detection and 99.0% for anomaly detection☆15Dec 30, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Anomaly IDS using a one-class autoencoder.☆11Oct 31, 2019Updated 6 years ago
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆18Jun 18, 2024Updated last year
- Live Streaming Server based on NGINX and NGINX-RMTP-Module☆11Jul 1, 2020Updated 5 years ago
- Code Repository for Paper "HRGCN: Heterogeneous Graph-level Anomaly Detection with Hierarchical Relation-augmented Graph Neural Networks"☆15Sep 24, 2023Updated 2 years ago
- P4DDLe: Introducing Packet-Level Analysis in Programmable Data Planes to Advance Network Intrusion Detection☆21Oct 7, 2024Updated last year
- Extract Features from suspected DNS Tunneling traffic☆12Oct 12, 2016Updated 9 years ago
- A Software Defined Network (SDN) code with a load balancer that I implemented along with layer-3 routing application.☆11Jan 4, 2017Updated 9 years ago
- Add download full presentation mp4 button to player☆13Feb 9, 2024Updated 2 years ago
- The BigBlueButton-Bot interfaces with the platform's backend, enhancing user functionalities without a headless browser.☆12Feb 10, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆18Apr 10, 2025Updated 11 months ago
- source code for USENIX Security paper xNIDS☆60Aug 27, 2024Updated last year
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Oct 2, 2020Updated 5 years ago
- This is my study on detection and mitigation DDoS attacks in SDN☆21Jan 16, 2024Updated 2 years ago
- Ansible roles deploying BigBlueButton☆19Aug 25, 2022Updated 3 years ago
- Small python orchestration to enable user-controlled streaming☆20Apr 21, 2021Updated 4 years ago
- Playing around with IDS data in Keras☆13Apr 13, 2020Updated 5 years ago
- DDoS attacks detection by using SVM on SDN networks.☆156Nov 2, 2022Updated 3 years ago
- Euclid: A Fully In-Network, P4-based Approach for Real-Time DDoS Attack Detection and Mitigation☆13Nov 22, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Easy Multi-purpose Rooms Manager for BigBlueButton, with fine-grained and fully customisable configuration☆20Feb 15, 2026Updated last month
- Scripts for BigBlueButton admins including extracting IP of users joining, participants attendance and poll answers☆17Aug 18, 2023Updated 2 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Oct 18, 2023Updated 2 years ago
- JavaScript layer to interact with BigBlueButton API☆22Mar 11, 2021Updated 5 years ago
- A project that is used to analyze multiple machine learning classifiers for DDoS detection from botnets and finalize the best classifier.…☆21Sep 30, 2022Updated 3 years ago
- Authentication Hook for nginx to restrict access to BigBlueButton recordings☆16May 6, 2021Updated 4 years ago
- automation tool for BigBlueButton and Greenlight☆20Jul 7, 2020Updated 5 years ago